Sample Chapter: Business Information Systems

Page 1


Copyrighted material – 9781352007381

CONTENTS List of figures and tables List of case studies About the author Message to students Message to lecturers Employability and information systems About the book Tour of the book Careers videos Guide to the website

Chapter 1

xii xvii xix xx xxii xxvi xxviii xxxii xxxiv xxxv

Introduction: the domain of business information systems 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13

Chapter 2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13

1

Why study business information systems? The domain model Data Information Infrastructure ICT systems infrastructure The digital environment Digital business Social media Mobile commerce Designing digital organisation Digital innovation and digital strategy Conclusion

2 5 9 13 14 17 20 23 25 25 26 26 29

Systems of organisation

31

Introduction The nature of organisation Organisation as a system Patterns of organisation What is organisation for? Control Modelling activity Conclusion Review test Exercises Projects Further reading Bibliography

32 32 36 39 43 46 50 55 56 57 57 58 58

Copyrighted material – 9781352007381

vii


Copyrighted material – 9781352007381 Contents

Chapter 3

Chapter 4

Data and information

59

3.1 Introduction 3.2 Data 3.3 Data systems 3.4 Information 3.5 Conversations for action 3.6 Conclusion 3.7 Review test 3.8 Exercises 3.9 Projects 3.10 Further reading 3.11 Bibliography

60 61 70 75 89 92 93 95 95 96 96

The infrastructure of organisation 4.1 Introduction 4.2 The nature of infrastructure 4.3 The infrastructure of RAF fighter command (Case) 4.4 Common infrastructure 4.5 Back-end information systems infrastructure 4.6 Front-end information systems infrastructure 4.7 Data systems infrastructure 4.8 Infrastructure, strategy and change 4.9 Conclusion 4.10 Review test 4.11 Exercises 4.12 Projects 4.13 Further reading 4.14 Bibliography

Chapter 5

ICT infrastructure 5.1 Introduction 5.2 Communication networks 5.3 The World Wide Web 5.4 ICT systems 5.5 Internet, intranet and extranet 5.6 The benefits of ICT infrastructure 5.7 Web 2.0 and the commercial web 5.8 Cloud computing 5.9 Big data 5.10 Cyber-security 5.11 Conclusion 5.12 Review test 5.13 Exercises 5.14 Projects 5.15 Further reading 5.16 Bibliography

viii

Copyrighted material – 9781352007381

98 99 99 105 111 114 118 125 128 129 131 131 132 133 133

134 135 136 140 143 147 148 150 151 154 156 162 163 164 164 165 165


Copyrighted material – 9781352007381 Contents

Chapter 6

Chapter 7

Chapter 8

The digital environment

166 167 168 177 179 183 189 195 196 197 198 198 199

6.1 Introduction 6.2 Value 6.3 The value chain 6.4 The value network 6.5 Digital society 6.6 Digital polity 6.7 Conclusion 6.8 Review test 6.9 Exercises 6.10 Projects 6.11 Further reading 6.12 Bibliography

Digital business

200 201 202 205 207 207 216 218 224 225 226 226 227 227

7.1 Introduction 7.2 Commerce 7.3 Controlling the value network 7.4 Electronic commerce 7.5 B2C ecommerce 7.6 B2B ecommerce 7.7 C2C ecommerce 7.8 Conclusion 7.9 Review test 7.10 Exercises 7.11 Projects 7.12 Further reading 7.13 Bibliography

Electronic marketing, procurement and government

228 229 230 235 237 240 248 254 255 256 257 258 258 259

8.1 Introduction 8.2 Electronic marketing 8.3 Marketing data 8.4 Google (Case) 8.5 Electronic procurement 8.6 Electronic government 8.7 Indian identity number (Case) 8.8 Conclusion 8.9 Review test 8.10 Exercises 8.11 Projects 8.12 Further reading 8.13 Bibliography

Copyrighted material – 9781352007381

ix


Copyrighted material – 9781352007381 Contents

Chapter 9

Mobile commerce, social media and disruptive innovation 9.1 Introduction 9.2 Social media 9.3 Facebook (Case) 9.4 Mobile commerce 9.5 Uber (Case) 9.6 Disruptive innovation 9.7 Digital ecosystems 9.8 Web unicorns 9.9 Conclusion 9.10 Review test 9.11 Exercises 9.12 Projects 9.13 Further reading 9.14 Bibliography

Chapter 10

Chapter 11

Designing digital organisation

261 262 267 271 274 277 279 281 282 282 283 284 284 285

286

10.1 Introduction 10.2 The design orientation 10.3 Problem-setting 10.4 Investigating domains of organisation 10.5 Designing organisation 10.6 Establishing projects of business analysis and design 10.7 Prince2 (Case) 10.8 Conclusion 10.9 Review test 10.10 Exercises 10.11 Projects 10.12 Further reading 10.13 Bibliography

287 287 291 295 299 308 315 317 318 318 319 319 320

Digital innovation and digital strategy

321

11.1 Introduction 11.2 Business models 11.3 Business change 11.4 Business motivation 11.5 Business strategy 11.6 Business innovation 11.7 Business motivation and business strategy 11.8 Business evaluation 11.9 Conclusion 11.10 Review test 11.11 Exercises 11.12 Projects 11.13 Further reading 11.14 Bibliography

x

260

Copyrighted material – 9781352007381

322 322 328 331 336 339 345 349 354 355 356 356 356 357


Copyrighted material – 9781352007381 Contents

Chapter 12

Chapter 13

Developing, managing and operating digital infrastructure

358 359 359 361 367 374 375 380 382 383 383 384 384 384

12.1 Introduction 12.2 The ICT industry 12.3 The ICT infrastructure service 12.4 Information systems development 12.5 ICT governance 12.6 Operating ICT infrastructure 12.7 Green ICT 12.8 Conclusion 12.9 Review test 12.10 Exercises 12.11 Projects 12.12 Further reading 12.13 Bibliography

The changing nature of digital infrastructure

385 386 386 391 398 401 405 409 413 414 414

13.1 Introduction 13.2 Ubiquitous computing 13.3 Artificial intelligence 13.4 Future computers 13.5 A theory of information systems 13.6 Key principles of information systems 13.7 Understanding change to digital infrastructure 13.8 Conclusion 13.9 Further reading 13.10 Bibliography

Case studies 415 Journal of Information Technology Teaching Cases 440 Bibliography 444 Glossary 450 Index 467

Copyrighted material – 9781352007381

xi


Copyrighted material – 9781352007381

CHAPTER OUTLINE 1.1 Why study business information systems? 1.2 The domain model 1.3 Data 1.4 Information 1.5 Infrastructure 1.6 ICT infrastructure 1.7 The digital environment

1.8 1.9 1.10 1.11 1.12

Digital business Social media Mobile commerce Designing digital organisation Digital innovation and digital strategy 1.13 Conclusion

DIGITAL STRATEGY, MANAGEMENT AND OPERATION

EVALUATION

IMPLEMENTATION

ORGANISATION

CONSTRUCTION

ENVIRONMENT

DESIGN

DEVELOPING DIGITAL ORGANISATION

ANALYSIS

ACTIVITY SYSTEM

ACTIVITY

INFORMATION

INFORMATION SYSTEM

DATA

ICT SYSTEM

VALUE

OPERATION

VALUE

‘When I use a word’, HumptyDumpty said in a scornful tone, ‘it means what I choose it to mean – neither more or less’. – Lewis Carroll (1832–1898) Through the Looking Glass (1871)

CONCEPTION

1

INTRODUCTION: THE DOMAIN OF BUSINESS INFORMATION SYSTEMS

EXTERNAL ACTOR ICT SYSTEM

Copyrighted material – 9781352007381

1


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

1.1 WHY STUDY BUSINESS INFORMATION SYSTEMS? You the reader will be engaging with the topic area of this book, probably every waking hour of your life. You may be using your mobile phone to text, message or email friends, or to access your page on a social networking site. You might use your personal computer at home to order goods online, pay your taxes to government as a banking transaction or apply for a job using a company website. You might use your interactive digital television to download and watch a movie. You might use your tablet or eBook reader on the train to read the latest crime thriller or perhaps even a textbook. Information and communication technology (ICT) is constantly present as it underpins so many aspects of our modern daily life. But you probably have never pondered on the way in which such technologies work or how such technologies support the activities we pursue. Why should you? The very presence and contribution of ICT frequently only comes to attention when there is a breakdown in its appropriate use or a malfunction in the technology itself. So when you find that you cannot access the Internet because your broadband connection has failed, you are likely to feel frustrated. When your personal details have been accessed on your social networking profile by a potential employer, you might feel somewhat uncomfortable. When you are sent targeted emails by companies who have analysed your web surfing activities, you might feel somewhat aggrieved. When someone steals your online identity to pilfer funds from your bank account, you might feel very angry. When you cannot do any work because the central ICT systems are down, you might feel helpless. So it may be that, when things are running smoothly, ICT is effectively ‘invisible’ to all but ICT professionals. But to achieve such smooth running, organisations must anticipate future needs, plan and implement the relevant developments and continuously seek to protect their employees and customers. And to do this, they need people able to understand and reconcile the needs of the market and the organisation with the everevolving capability of ICT.

1.1.1 The infrastructure of contemporary society, economy and polity In this book we consider the interaction of ICT, information systems and information with organisational activity of all forms – within the private sector, within the public sector and even within the voluntary sector. These three things together form critical infrastructure for all forms of modern organisation – not only in terms of the internal operations of the organisation but more widely in terms of the interaction between an organisation and its customers, suppliers, regulators and partners. The modern business organisation needs to store data, for example, about its customers, orders, sales, stock and inventory. It needs this data to be integrated, and it needs it to be accurate and up to date. As a result, the management of data and the information it communicates is critical to business success. Therefore, an understanding of this area is important to both current and aspiring business professionals of all forms – from the shop-floor worker to the modern executive. But an understanding of this area is also important for ourselves as individuals who live and work in the digital age. As individuals, an increasing proportion of both our working life and our leisure activity is conducted through interaction with ICT. Indeed, it is increasingly true that our very existence as workers, citizens and even family members is dependent upon our access to ICT and the consequent skills required to use it. For example, much of our personal identity is now bundled up in the large range of authentication tokens that we need to gain access to organisational ICT systems – passports, driving licences, credit cards, debit cards, library cards, employee identity 2

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems cards and so on. ICT has also caused changes to the way in which we work. A substantial proportion of individuals now work from home or on the move, using ICT to keep in contact with an organisational hub wherever they are. But our life as consumers is also reliant upon ICT infrastructure. Increasingly, shopping for goods and services is done online rather than offline, causing subtle changes to the ways in which retail organisations adapt to such changes in consumption practices. ICT forms critical infrastructure for modern organisations and individuals; as a technology it is converging around common standards, and this is leading to increased integration and interoperability of electronic devices and systems. For example, we can now access pretty much the same material from our smartphone or tablet computer as we can from our Internet-enabled personal computer. However, many people are worried that this type of convergence could enable governments (or other groups) to take greater control over people; and about the dangers if personal data falls into the wrong hands. In many countries there is continuous debate and negotiation over what data the government or other bodies should be allowed to collect about individuals, what purposes the information these data communicate can be used for, and how the integrity of these data can be protected.

1.1.2  How business information systems relates to other academic disciplines The term ‘information systems’ is used in a number of different ways. It can refer to: ●● A product: a system of communication between members of a group of people.

(These days many communication systems involve technology, although there are ways of communicating without technology too, of course, and have been for thousands of years. But an information system as a product really refers to a technological information system.) For example, an orders and sales processing system is an information system, used to communicate between members of the selling organisation, and between them and their customers. ●● An academic field of study. Some of the first courses in information systems were run in Stockholm in the 1960s. Over the last three decades the field of information systems has become established in many centres of higher education around the world, in both teaching and research. ●● An area of industrial practice. Many organisations across the world work in planning, managing and developing information systems for other organisations. Some of the largest and best-known business consultancies do a lot of their work in this field. Organisations in other fields, which originally developed their expertise in setting up their own systems, also sell their know-how to others.

Since information systems are essential in so many ways for modern organisations and individuals, this area is very interdisciplinary in nature. Business information systems can be regarded as being made up of five interdependent areas of interest, as shown in Figure 1.1. ●● Environment. To understand the value of information systems to organisations we

need to understand the economic, social, political and physical environment within which the organisations using them operate. ●● Organisations. One of the main focuses of the book is on how modern information systems contribute to organisational performance: supporting traditional organisational forms and leading to new ones being introduced. ●● Management. The promise of the technology is only achieved when managers find effective ways of managing information, information systems and ICT in their organisations. Copyrighted material – 9781352007381

3


Copyrighted material – 9781352007381 Introduction: the domain of business information systems ●● Technology. Of course, those studying this field need to know something about the

technology involved. This includes both the use of technology and the principles that underlie it. ●● Design. This concerns appropriate ways of analysing, designing and constructing information systems that support human activity. This way of dividing the subject area enables us to consider more clearly how business information systems overlaps with five other established disciplines. These are known as reference disciplines (Keen, 1980) in Figure 1.1, since they provide us with major frames of academic reference. ●● Economics, politics and sociology overlap with the subject through its emphasis

●● ●● ●● ●●

on context, particularly the social and economic effects of information systems and ICT. Organisational theory (and particularly organisational behaviour) overlaps with the subject through its emphasis on organisational issues. Management science and operations management overlap with the subject through its interest in appropriate management. Computer science overlaps with the subject because of the need for knowledge about the workings of contemporary ICT. Software engineering overlaps with the subject through its interest in the process of analysing, designing and constructing information systems.

Computer Science

Technology

Sociology Economics Politics

Environment

Management

Management Science/ Operations Management

Figure 1.1  Reference disciplines 4

Copyrighted material – 9781352007381

Software Engineering

Design

Organisation

Organisation theory/ Organisational Behaviour


Copyrighted material – 9781352007381 Introduction: the domain of business information systems Within the area of business and management itself, the concepts of information and system are both integral and integrating. This means that information systems are critical to understanding contemporary operational practices in marketing, sales, customer relations, production, finance, human resources, procurement and distribution. An understanding of information, information systems and ICT is particularly important to management practice in these areas, so there is a strong argument for placing an understanding of this area at the heart of operating and managing the modern business.

1.1.3  How this book will help To summarise, information systems are critical to the modern world: in business, in other sectors, and to individuals as well. It is important to appreciate their importance and to understand their founding principles. This book shows you how to use best practice to ensure that you and your organisation get the most value out of your ICT investment, now and in the future. The focus here is on the application of information systems in organisations, and because this is so intimately tied up with other aspects of organisational management, we look at some of those as well. We introduce a number of key skills that are important not only for information systems professionals, but also for general business management. These are intended to provide an appreciation of important approaches and techniques in the area. Models are useful, to help us understand what is going on, and plan how to change it. A consistent set of modelling techniques are used throughout the book. Together, they provide a good grounding in the applications of modelling, especially for the analysis and design of many kinds of business systems. Overall, this book should enable you to develop an understanding and practical appreciation of information systems. It will serve you well, both in the study of related disciplines and in your working career.

1.2  THE DOMAIN MODEL The field we are considering is very much a systemic discipline. It is interested not in ICT, information systems, information and organisations in isolation, but in their interaction. To make sense of systems of any kind it is useful to create models which illustrate the interactions of their components, interdependencies and their effects. This book is structured around a core model which captures the key elements of the field as well as the interaction between these elements. As a map of the entire area or domain, we refer to as the domain model. Our model is founded on the premise that the effects of an information system for an organisation emerge over time, as the result of interaction of the system and its organisational context. We need to understand these effects in order to design and run systems that provide benefits for the organisation, and avoid the hazards that information systems are sometimes prone to. The domain model illustrated in Figure 1.2 forms the basic structure for the book. Each of the component elements contained in the model is covered in much more detail in further chapters within the book. So you might not understand all the concepts introduced here right away, but you can explore them throughout the book, and follow links to further chapters at any time if you want to delve into one facet of the model. This chapter not only introduces the domain model, it acts as a summary and reference for it. Copyrighted material – 9781352007381

5


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

DIGITAL STRATEGY, MANAGEMENT AND OPERATION

EVALUATION

IMPLEMENTATION

CONSTRUCTION

DESIGN

ORGANISATION

ANALYSS

ENVIRONMENT

CONCEPTION

DEVELOPING DIGITAL ORGANISATION

ACTIVITY SYSTEM

ACTIVITY

INFORMATION

INFORMATION SYSTEM

DATA

ICT SYSTEM

VALUE

VALUE

OPERATION

EXTERNAL ACTOR ICT SYSTEM

Figure 1.2  The domain model The model begins with the key context for the application of information systems: the organisation itself. Within this book we need to provide you with a different way of thinking about what organisation is to understand why ICT is so important to organisation. Any organisation is considered as a series of interdependent activity systems (see Figure 1.3). Hence we nest the activity system box within the box labelled organisation on the domain model. When activity systems are combined in action within some organisation they produce value of some form. Value is the key flow between an organisation and actors in its environment. Hence we express value as a broad arrow on the domain model flowing from the organisation to an external actor or from an external actor to the organisation. The value produced by a business organisation is typically the products (goods) or services it provides for its customers. So customers are key actors in the environment of the business organisation. The organisation also receives value from other actors in its environment, such as its suppliers or partners. Hence a business organisation is a valuecreating system which interacts with a wider value network that makes up its environment. A system is a coherent set of interdependent components that exists for some purpose, has some stability and can usefully be viewed as a whole. We are particularly interested in what are generally referred to as open systems. These are systems that 6

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

ORGANISATION

VALUE

VALUE

ACTIVITY SYSTEM

EXTERNAL ACTOR

Figure 1.3  Organisation, activity systems and environment interact with their environment through inputs and outputs. By the environment of a system we mean anything outside the system that has an effect on the way the system operates. We usually identify a number of actors with which the system interacts, to help define this environment. The inputs to the system are the resources it acquires from actors in its environment. The outputs from the system are those things that it supplies back to actors in its environment.

1.2.1  Goronwy Galvanising as a value-creating system

CASE

Consider a manufacturing organisation, Goronwy Galvanising, which specialises in galvanising steel products such as lintels, crash barriers and palisades. As a value-creating system we might consider Goronwy Galvanising in the following way and as illustrated in Figure 1.4. The central system of activity undertaken by this organisation is galvanisation, which involves dipping steel products in large baths of molten zinc, to provide a rustproof coating. The main actors in Goronwy’s environment are its suppliers and customers. Goronwy uses large amounts of zinc as its raw material and which it receives from its owning company, Rito Metals. The company also receives ungalvanised material from its customers and refers to this as ‘black’ material. Both zinc and ‘black’ material are inputs into this system. The key value created by this organisation is galvanised product which is referred to as ‘white’ material and constitutes the key output from this system. Along with the flow of value through this system there is a corresponding flow of data. As we shall see, a delivery advice note identifies and describes incoming ‘black’ material, while a dispatch advice note identifies and describes outgoing ‘white’ material. A key advantage of thinking of organisation in systems terms is that we can unpack organisation at various levels of abstraction. In other words, we can open up the box on Figure 1.4 and peer within. Any system of organisation is established to achieve one or more goals, which is typically to produce value of some form. For commercial organisations that value becomes concrete when they sell their products or services and make a profit. We can also think of the organisation as part of a value network, in which there are flows of value between the organisation and the actors in its environment (its customers and suppliers). So, as well as creating value itself, Goronwy adds value to the outputs of other actors in its value network. Steel producers, steel fabricators and zinc producers are all part of Goronwy’s value network.

Copyrighted material – 9781352007381

7


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

Actor Rito metals Physical flow

Zinc

Data flow

Delivery advice note

White material Goronwy Galvanising

Customer Black material

Dispatch advice note

Customer

Figure 1.4  Goronwy Galvanising as a value-creating system

1.2.2  The activity system at Goronwy

CASE

8

Numerous organisational actors undertaking coordinated activity transform value in various ways. We use the term ‘actor’ to refer to anything that can act (both people and machines) – that can transform something. Each system of coordinated action performed by actors we refer to as an activity system. An activity system is a social system, sometimes referred to as a ‘soft’ system. It consists of a collection of activities, processes or tasks performed by a group of people in pursuit of a goal. The precedence or order of activities is normally critical, as this determines the flow necessary for the coordination of work. To achieve the goal of creating value, people and machines must continually perform a series of activities at certain times and in certain places, as illustrated in Figure 1.5. Various visualisations such as this are used throughout the book to unpack the key systems of interest to us. Each box or cell is used to represent one or more actions enacted by one or more actors. The dotted arrows indicate the sequence of action within the pattern or system under consideration. In Figure 1.5 the dotted arrows indicate the coordination (the workflow), which activities take place before certain other activities, and which take place after certain activities. The open circles with dotted arrows emerging from them indicate the start of some pattern of action while the open circles with arrows ending on them indicate the end of some pattern of action. The ‘black’ material – steel fabricated products of various forms – is delivered to Goronwy on large trailers in bundles referred to as batches. It is unpacked by an inbound logistics operative and checked for discrepancies or problems that would make it unsuitable for galvanising. Such unsuitable material is referred to within the company as non-conforming black material and this is returned to the customer. If satisfactory, the products are referred to as conforming black material and this material is transported to the galvanising plant where it is hung on racks and then dipped into large baths of zinc. The racks are removed from the baths after a few minutes of treatment and then left to dry. An hour or so later the white material is checked and unsatisfactory (non-conforming) white material is sent to be regalvanised. Satisfactory (conforming) white material is then bundled back into batches, loaded onto trailers and eventually dispatched back to the customer.

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems Dispatch non-conforming black material

Check black material {Unloaded Batch}

Galvanise material Inbound logistics operative

{Conforming black material}

Outbound logistics operative

Outbound logistics controller

{White material}

Outbound logistics operative

{Dispatch white material}

Check white material

{Conforming white material}

Outbound logistics operative

Dispatch white material

Production operative

{Conforming black batch}

{White material}

Return non-conforming white material

Outbound logistics operative

Sequence

{Non-conforming white material}

Activity

Production operative

Inbound logistics controller

Inbound logistics controller

{Unload black batch}

Inbound logistics operative

Receive black material

Outbound logistics controller

{Dispatch non-conforming black material}

Figure 1.5  A visualisation of the activity system at Goronwy

CASE continued…

In essence, any system or pattern of activity relates to the fundamental question of: What does an organisation such as Goronwy do? The response to such a question normally indicates the central activity of the organisation: in this case galvanisation. But galvanisation relies on one set of activities that handle raw material from the customer; and yet another set of activities that transport galvanised products back to the customer. Hence it is possible to think of the activities of Goronwy related by precedence. In other words, to perform one activity another activity needs to be performed first, and the performance of such activity will normally be a prerequisite for some other activity, and so on.

1.3 DATA We want you to realise the important difference between data and information, and the consequences this distinction makes to understanding the benefits of the digital to organisation. To help coordinate activity, people and machines must communicate through the accomplishment of information. Communication occurs through data structures acting as messages or as records. These data structures are created,

Copyrighted material – 9781352007381

9


Copyrighted material – 9781352007381 Introduction: the domain of business information systems updated, deleted and read within the data systems of organisations. Such data structures are then made sense of as information by people and machines within the information systems of organisation. Information as instrumental communication is very important to decision-making. It helps actors make decisions as to what activity to undertake next, and through this, serves to control the activity of some organisation.

1.3.1  Data structures at Goronwy

CASE

The data needed by people working within Goronwy originally consisted of three paper documents (see Figure 1.6) – a delivery advice, a job sheet and a dispatch advice. Each of these documents consist of a data structure – a structure for data. The delivery advice details what batches have been delivered on a given truck to Goronwy. A trailer arriving from a customer might be loaded with several different types of steel product. These were divided into batches, and each batch was labelled with a unique order number. Each trailer was given a delivery advice note detailing all the associated batches on it. A job sheet was produced for each unloaded batch to detail the conforming (for galvanising) and non-conforming (for return to the customer) material. On arrival at the galvanising plant the black material was unpacked by an inbound logistics operative and checked for discrepancies with the information on the delivery advice note. There are two major types of discrepancy: a count discrepancy, between the number of items delivered and the number indicated on the delivery advice note; a non-conforming black discrepancy arises when some of the material is unsuitable for galvanising. For instance, a steel lintel might be bent or the material might be of the wrong type. The operative would note both kinds, by making a comment in the appropriate box on the delivery advice note. When all the material had been checked, the delivery advice note was passed on to the production controller who, with the office clerk, copied by hand all the details on the delivery advice note, including any discrepancies, to a job sheet. A separate job sheet was filled in for each order line on the delivery advice note. The job sheet was passed down to the shop floor of the factory, where the shift foreman used it to record details of processing. Most jobs passed through the galvanising process smoothly. The steel items were placed on racks, dipped in the zinc bath and left to cool. The site foreman then checked each job. If all items had been galvanised properly, he put a Y for yes in the box on the job sheet and passed it back to the production controller. Occasionally, some of the items were not galvanised properly. They were classed as non-conforming white, and also noted on the job sheet (and typically scheduled for regalvanising). A dispatch advice details the galvanised batches to be returned to customers. When the shop floor had treated a series of jobs, the production controller issued a dispatch advice note and sent it to the outbound logistics section. Workers in this section used it to stack the white material on trailers – one trailer to a dispatch advice note – ready to be returned to the manufacturer.

1.3.2  The data system at Goronwy

CASE 10

This description details a series of actions taken within the data system of Goronwy and as illustrated in Figure 1.7. Delivery notes, dispatch notes and job sheets are all data structures articulated by key actors within the data system at Goronwy. An ICT system is an instance of a data system. ICT consists of hardware (such as computers and display

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

Delivery advice

Blackwalls steel products Advice No.

Date

Customer name

Instructions

A 3137

20/01/1988

Goronwy Galvanising Galvanise and return

Order No.

Description

Product code

13/1193G

Lintels

UL 150

1500

20

145

44/2404G

Lintels

UL 1500

15000

20

1450

20

130

16

80

Item length

70/2517P

Lintels

UL 135

1350

23/2474P

Lintels

UL 120

1200

Haulier

Received in good order

International 5

Delivery Qty

Weight (Tonnes)

Dispatch advice

Goronwy Galvanising Advice No.

Date

Customer name

101

22/01/1988

Blackwalls

Batch weight

Description

Product code

13/1193G

Lintels

UL 150

1500

20

145

20

150

44/2404G

Lintels

UL 1500

15000

20

1450

20

1460

70/2517P

Lintels

UL 135

1350

20

130

20

135

UL 120

1200

16

80

14

82

23/2474P

Lintels

Driver

Received by

Item length

Order Qty

Order No.

Returned Qty Returned weight

Job sheet 2046

Job No: Order no.

Description

Product code

13/1193G

Lintels

L150

Item Length

Count discrepancy

Non-conforming black

Non-conforming white

Non-conforming no change

Galvanised

Dispatch no.

Dispatch date

Qty returned

1500

Order Qty 200

Batch weight 145

Weight returned

Y

Figure 1.6  Data structures at Goronwy

Copyrighted material – 9781352007381

11


Update non-conforming material UPDATE<Job sheet: non-conforming black material>

UPDATE<Delivery advice copy>

Inbound logistc controller

Finalise job sheet UPDATE<Job sheet: Dispatch conforming white material>

UPDATE<Job sheet: checked>

Figure 1.7  A visualisation of the data system at Goronwy

UPDATE<Dispatch advice copy>

CREATE<Dispatch advice>

Create dispatch advice

CREATE<Job sheet>

Create job sheet

READ<Job sheet>

READ<Job sheet>

Update job sheet

UPDATE<Job sheet conforming black material>

Update conforming material

Inbound logistic operative

READ<Delivery advice>

Delivery driver

Inbound logistic controller

Outbound logist controller

Inbound logistic controller Inbound logistics controller UPDATE<Job sheet: galvanised>

Production operative

Inbound logistic controller Production controller

Inbound logistic operative Dispatch driver

Inbound logistic operative Production operative

Data structure

Act of articulation

UPDATE<Job sheet: non-conforming white material>

Update non-conforming material

Actor

Receive delivery advice

Production contro

Copyrighted material – 9781352007381

Production operative

12 Production controller

Sequence

Copyrighted material – 9781352007381

Introduction: the domain of business information systems


Copyrighted material – 9781352007381 Introduction: the domain of business information systems the speakers’ psychological state, feelings or emotions towards some aspect of the domain of organisation, such as apologies, criticisms and congratulations. In the case of Goronwy, the production controller might comment to his workers, [I am pleased with our production over the last quarter]. Finally, declaratives are communicative acts that aim to change some aspect of a domain through the communication itself. Within business settings declaratives are frequently used to represent that some state of performance has been achieved such as in the case of Goronwy, [That batch Z has been galvanised] or [That batch Y has been dispatched back to customer X].

1.4.2  The information system at Goronwy

CASE

Such acts of communication occur not in isolation but in patterns. Patterns of communication support patterns of coordinated activity. As such, an information system is a system of formal communication between people. Information systems are established and formalised systems of communication within organisations designed to get things done. Information systems support activity systems in the sense that the accomplishment of information is important for decision-making, and in turn for the coordination of activity to meet established goals. The information system important to the case of Goronwy Galvanising is visualised in Figure 1.8.

1.5 INFRASTRUCTURE As we shall see, it is useful to think of organisation not as one system but as consisting of an infrastructure of systems. We can also think of vertical as well as horizontal infrastructure. Vertically, and as illustrated in Figure 1.9, we can think of systems of activity reliant upon systems of communication (information), which in turn are reliant upon systems of articulation (data). These three layers of infrastructure are critical to any organisation whether it be private sector, public sector or voluntary sector. Activity systems are supported by information systems which in turn are supported by data systems or ICT systems. But usually in any reasonably sized organisation there are lots of different things going on which have to be in some way integrated together. This means that horizontally, and as illustrated in Figure 1.10, we can think of organisation as sets of interrelated activity systems, information systems and data (ICT) systems. This idea of infrastructure allows us to understand why change to any domain of organisation cannot just involve changes to activity. Any change to a particular part of infrastructure is likely to impact upon other elements of infrastructure, both vertically and horizontally. This allows us to understand more clearly how change through ICT is not always as easy as it seems, and why changing what you do or communicate about inherently demands change to ICT.

1.5.1  Infrastructure at Goronwy

CASE

14

The three levels of activity, information and data make up the systems or patterns of action that constitute Goronwy as an organisation. Within Goronwy, people articulate data structures, primarily through the interface of a specially designed (bespoke) ICT system. The articulation communicates what has happened, what is happening and what should happen to important actors. The communication allows actors to make decisions as to what action to take next.

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381

Actor

Delivery driver

ASSERT[These products X are conforming white material]

COMMIT[I will unload trailer X in time Y to bay Z]

Inbound logistics operator

DECLARE[Trailer X has been unloaded to bay Z and is available for checking]

Confirm unloading of black material

DECLARE[batch X has been checked]

ASSERT[Batch X is ready for checking]

Declare white material checked

Inbound logistics operator

ASSERT[These products X are nonconforming white material]

Assert non-conforming white material

Production controller

Figure 1.8  A visualisation of the information system at Goronwy

Act of communication

Sequence

Communication

Inbound logistics controller

Production operative

Assert conforming white material

ASSERT[Confirm receipt of material X]

Inbound logistics controller Production controller

controllerInbound logistics

DIRECT[This delivery needs to be unloaded for checking to bay Z] Inbound logistics controller Outbound logistics controller

Direct unloading of black material

Production operative

DECLARE[Trailer X has been delivered]

DIRECT[Deliver trailer X of material Y to customer Z]

Direct dispatch of material

DECLARE[This material from batch X has been galvanised]

DIRECT[Galvanise this material from batch X]

Declare material galvanised

DECLARE[batch X has been checked]

Declare black material checked

ASSERT[These products X are conforming black material and can be galvanised]

Assert conforming black material

COMMIT[I will return material on trailer X to customer Y]

ASSERT[These products X are nonconforming black material]

Assert non-conforming black material

Inbound logistics controller

Inbound logistics controller

ASSERT[This delivery consists of X amount of black material Y on trailer Z]

Production controller

Production operative

Production controller

Inbound logistics Operative Production operative

Dispatch driver Production controller

Assert receipt of black material

Copyrighted material – 9781352007381 Introduction: the domain of business information systems

15

Dispatch driver


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

ORGANISATION

ACTIVITY SYSTEM

ACTIVITY SYSTEM

INFORMATION SYSTEM

ACTIVITY SYSTEM

INFORMATION SYSTEM

ICT SYSTEM

INFORMATION SYSTEM

ICT SYSTEM

ICT SYSTEM

Figure 1.9  The vertical infrastructure of organisation

ACTIVITY SYSTEM

ACTIVITY SYSTEM

INFORMATION SYSTEM ICT SYSTEM

ACTIVITY SYSTEM

INFORMATION SYSTEM Data

INFORMATION SYSTEM

ICT SYSTEM

ICT SYSTEM

Data

Figure 1.10  The horizontal infrastructure of organisation In Figure 1.11, an electronic dispatch advice is created by a production clerk. This is a data structure. Data represented on this structure not only identifies and refers to things, it also informs somebody as to what to do next. The information communicated causes somebody to take action, namely, to load a particular truck with particular product.

CASE continued…

Articulation

CREATE <Dispatch advice>

Communication

Coordination

DIRECT<Load batches X for customer Y on truck Z>

---------------------------------------------------------

Load <Batches>

Dispatch advice Batch Production clerk

Outbound logistics operative

Outbound logistics operative

Figure 1.11  Articulation, communication and coordination 16

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

screens), software (such as operating systems and office products), data (such as databases) and communication technology (such as wireless networks) used to automate either the whole or part of some data system. Originally, the data system at Goronwy was paper-based, meaning that data structures were manipulated as physical pieces of paper. Eventually, Goronwy decided to automate this data system by applying ICT.

CASE continued…

1.4 INFORMATION Data is a plural term, whereas a datum is a unit of data. To form a datum we make certain differences in some substance and use such differences to code symbols. Symbols are of course things used to represent something else. Symbols are formed into larger entities as data structures and such data structures may be transmitted as messages or may be stored in a persistent manner as records. The differences made upon some data structure inform people about significant things of interest to them. Information is thus the differences made to some actor by their engagement with some data structure(s). This accomplishment of information through data enables them to coordinate their joint activity. A delivery advice is a data structure important to Goronwy Galvanising. Marks made on the substance of paper constituted the differences used to code symbols such as UL150. When the ICT system was built for this company such differences were encoded as symbols onto magnetic disk. These symbols in combination are a component element of the larger data structure which comprises the delivery advice. The symbols on this data structure record important things of interest to the staff of Goronwy. When particular actors engage with the data structure of a delivery advice they are informed of things such as what material is being delivered to the company. This information enables them to make effective decisions about galvanisation activity.

1.4.1  Acts of communication Information is accomplished in acts of communication – communicative acts. Communication is an act of sending and receiving a message. Any message has both content and intent. The content of a message refers to and describes the common things of interest between sender and receiver. The intent of a message establishes its purpose. The messages within communicative acts tend to be sent with one of five intentions and such intentions are important to the coordination of activity. Assertives are communicative acts that explain how things are in a particular domain of organisation, such as reports of business activity. In the case of Goronwy, an inbound logistics operative might make an assertion to the plant manager that [15% of all the black material we received over the last year was non-conforming]. Directives are communicative acts that represent the senders’ attempt to get the receiver of a message to perform or take an action, such as requests, questions, commands and advice. In the case of Goronwy, the plant manager might request of his production controller, [Please ensure that all conforming black material is galvanised on its day of delivery]. Commissives are communicative acts that commit a sender to some future course of action such as promises, oaths and threats. In the case of Goronwy, the manager might make the following commitment to its major customer, Blackwalls: [We promise to turn around all products within a three-day period]. Expressives are communicative acts that represent Copyrighted material – 9781352007381

13


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

CASE continued…

Activity systems are systems of coordination. They rely upon systems of communication – information systems. In turn, an information system relies upon a system for the articulation of data structures – a data system. Delivery notes, dispatch notes and job sheets are all data structures articulated by key actors within the data system at Goronwy. Such data structures communicate important things of interest to them and they use them to become sufficiently informed to make decisions: in Goronwy’s case, for example, what material to galvanise. The actors then act on the basis of their decisions. If the data is incorrect, the wrong information is communicated and the wrong decisions will be made, causing activity to underperform.

1.5.2  Information systems infrastructure Every organisation’s information systems are necessarily different, but there are similarities, especially across organisations in the same business sector. So it is possible to develop generic descriptions or models of both back-end and front-end information systems infrastructure. Key business back-end information systems include sales order processing, purchase order processing, inventory management, finance and payroll. The sales order processing information system records details of customer orders and supports activity systems such as sales and aftersales service. The inventory management information system maintains an inventory of raw material and finished goods. It is important for providing sales staff with accurate information on quantities and pricing of products. It also supports procurement activity. The purchase order processing information system records details of purchase orders and supports the procurement process. The financial information system records amounts owed by and to, and paid by and to, customers, suppliers and employees. It supports other infrastructure activities such as management and planning. The payroll information system records details of wages and payments made to employees and is a critical element of human resource management activity. Front-end information systems interface directly with major internal and external actors: managers, employees, suppliers and customers. Management-facing information systems are built on the foundation of back-end information systems. Management information systems are used by operational management to monitor the state of the organisation. Decision support systems and executive information systems generally support longer-term, strategic and tactical decision-making. Typical customer-facing information systems include sales, customer relationship management, marketing and outbound logistics. Typical supplier-facing information systems include procurement, inbound logistics and supplier-relationship management systems. Typical employeefacing information systems include human resource management and production control systems.

1.6  ICT SYSTEMS INFRASTRUCTURE As the Goronwy example has shown, information systems do not need to use modern ICT. But modern ICT makes systems work better and faster, and in today’s complex global world, most information systems use it to at least some degree. We can see why by looking at some of the problems with the system Goronwy used in the 1980s: ●● Data structures need to be shared among a number of people: for Goronwy, they

include inbound logistics operatives, production controllers, shift foremen and Copyrighted material – 9781352007381

17


Copyrighted material – 9781352007381 Introduction: the domain of business information systems outbound logistics operatives. So copies of data are needed, and making manual copies is slow and therefore expensive. ●● A lot of time was taken transferring data from one data structure to another: for instance, from delivery advice notes to job sheets. ●● Every transfer stage is an opportunity for human error to creep in, and this can lead directly to data processing errors, which are costly and time-consuming to correct. ●● It is difficult to analyse data held manually. Even if it works well for production purposes, it does not provide a good resource for managers who want to collate and analyse it to determine trends such as the throughput of the plant or the productivity of the workforce. As a result, Goronwy and its parent company looked at moving to an ICT-based system for basic administrative functions. Let’s consider what this means in practice. We can think of an ICT system as consisting of three interdependent subsystems or layers – a data management layer, a business layer and an interface layer. Each of these layers of technology interacts to enable a data system that can be used to integrate and distribute data structures among multiple actors, working in different places, often at different times.

1.6.1  The data management layer Since ICT systems are essentially systems for data articulation, they rely on a core repository: somewhere to keep the data used in the system. This repository is normally referred to as a database and is controlled by the data management layer of an ICT system. The design for the structure of the database at the heart of the ICT system is referred to as a data model. Essentially, this data model defines what data is stored within the system and in what form. For Goronwy, the structure of data might be defined as in Figure 1.12. This model acts as a design shorthand for specifying data structures in this database, such as ‘Customers’ and ‘Dispatches’. Each data structure is a collection of data elements, and each data element consists of a set of data items. A sample of the data that might be entered into ‘Order lines’ is shown in Figure 1.13. In this example, Order No and Delivery No are examples of data items. Each row of the table represents a data element. Each data element is identified by a key data item: in this example, the key is the value associated with an Order No, and such keys are underlined in the data structure definitions above. Data systems are effectively systems for articulating data structures. Many, if not most ICT systems, are examples of data systems, reliant upon computing and communications technology. So ICT is effectively a way of throwing technology at

Delivery advices

Delivery no.

Delivery date

Customer name

Instructions

Order lines

Delivery no.

Delivery Order No.

Description

Product code

Customers

Customer name

Customer address

Customer Tel. No.

Customer email

Product code

Product description

Product length

Product weight

Job No.

Delivery No.

Delivery Order No.

Count discrepancy

Product items Jobs Dispatch notes

Dispatch No.

Dispatch date

Customer Name

Dispatch items

Dispatch No.

Job No.

Returned quantity

Order qty

Order weight

Non-conforming black

Non-conforming White

Instructions Returned Weight

Figure 1.12  A model of the data management layer at Goronwy 18

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems Data structure Order No.

Delivery No.

Product code

13/1193G

A3137

UL150

20

145

44/2404G

A3137

UL1500

20

1450

70/2517P

A3137

UL135

20

130

23/2474P

A3137

UL120

16

80

Order Qty

Order Weight

Data element

Data item

Figure 1.13  A table as a data structure articulating data. The Goronwy ICT system allows data to be created quickly and distributed efficiently and effectively to many different people across the manufacturing plant. But ICT systems also interrelate horizontally within ICT infrastructure. Integration of data across the organisation is one key benefit of applying ICT. ICT infrastructure is critical to modern communication within organisations, but when it goes wrong things seriously happen within organisations.

1.6.2  Business layer The business layer of a typical business ICT system consists of three interrelated elements: transactions, business rules and update functions. A transaction changes a data structure from one state to another. There are four major types of transaction activities associated with a database, collectively referred to as CRUD: ●● Create transactions create new data elements within the data structures of a database.

For example, in Goronwy’s new ICT system, a ‘create’ transaction might be used to enter a new order line against a designated delivery advice. ●● Retrieval (or Read) transactions access data contained within the data structures of a database and are often called query transactions. In Goronwy’s new ICT system a ‘read’ transaction might be used to assemble a list of the order lines appropriate to a particular delivery advice. ●● Update transactions cause changes to values held within particular data items of data elements in a database. In Goronwy’s new ICT system an ‘update’ transaction might be used to change the value Order Weight associated with a particular order line. ●● Delete transactions erase particular data elements. In Goronwy’s new ICT system, a ‘delete’ transaction might be used to remove a particular order line from the database. A considerable amount of the functionality of an ICT system is taken up with business rules. These are found in both the business layer and the data management layer. They ensure that the data held in the data management layer remains an accurate reflection of the activity system it represents. In other words, the data held in an ICT system should display integrity; it should accurately reflect the state of its activity system. For instance, in the case of Goronwy, the data stored in the data structure Jobs should accurately represent batches of material that either have been successfully processed by the company in the past or are in the process of undergoing galvanisation. Likewise, in Copyrighted material – 9781352007381

19


Copyrighted material – 9781352007381 Introduction: the domain of business information systems a university, the data structure of a student record should store data about either existing students at the university or past students of the university. Update functions represent units of functionality associated with an ICT system. They include both business rules and transaction types. Update functions are triggered by events, which are typically activated from the interface or from other update functions. When an update function is activated, transactions are fired at the data management layer of the ICT system and cause changes to the database. Hence, in an ICT system at a university, a typical create function might be create student or enrol student on module. Alternatively, in the case of the Goronwy ICT system we might have a create function named create order line. When activated, this function would first check that a dispatch advice existed for the order line. Then it would check to see that the order line had not already been entered and that the data to be entered was in the correct format: for instance, that the order number is unique and a correct product code had been entered. If all these checks within business rules proved satisfactory, a transaction would be formed which would create a new row within the order lines table.

1.6.3  Interface layer The interface layer is responsible for managing interaction with the human user, and is generally referred to as the user interface, or sometimes as the human-computer interface. ICT systems are significant actors within modern organisations and as such must be communicated with. Such communication is normally defined in terms of some interface or series of interfaces. Such a user interface defines how human actors can interact with and control the ICT system. It also includes the ways in which the ICT system communicates with humans. In this sense, the user interface can be seen as a collection of dialogues: each dialogue being made up of a series of acts of communication between the human user and the ICT system. Business actors use the interface to input data into the system and to receive data output from the system. Decisions are made on the basis of information interpreted from the data supplied and action is taken within the encompassing activity system.

1.7  THE DIGITAL ENVIRONMENT It is more than likely that the person reading this book is a digital native, meaning that you have not known of a time when ICT was not around. You have grown up with ICT and as such are likely to treat it as an accepted and mundane background to your everyday life. But this acceptance of the embeddedness of ICT comes at a cost – the basis of ICT as designed artefacts or designed infrastructure goes relatively unquestioned. Also, some of the changes being enacted in the economies, societies and polities of nation-states through digital infrastructure seem inevitable, rather than the result of choices made by both the producers and consumers of ICT. The application of ICT is so embedded in modern life that it becomes appropriate to think of the digital society, digital economy and even the digital polity. It is becoming increasingly difficult to act as an individual in modern society without access to digital infrastructure. Increasingly, your activity as an economic actor is driven through ICT. Economic exchange worldwide relies upon ICT infrastructure. Organisations of all forms are increasingly dependent upon their ICT to produce value. What it means to be a citizen of a modern nation-state is increasingly reliant upon ICT infrastructure. As a citizen you are increasingly reliant upon ICT to pay your taxes, claim benefits and 20

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems gain advice on your rights. The way in which politics is conducted and policy enacted is increasingly reliant upon ICT infrastructure. Modern democracies owe much of their functioning to digital infrastructure.

1.7.1  Digital economy The primary environment of any commercial organisation is the economy. Economies can be considered as systems for coordinating the production, distribution and consumption of value. Value is created. Value is passed from creator to user. Value is consumed in some way. All economic activity relies upon the exchange of value. Somebody creates something of value to somebody else and exchanges this for something. But many aspects of economic exchange as an activity must be recorded, such as who is involved in the exchange, what is exchanged and how it is valued. So along with the flow of value between economic actors there is a corresponding flow of data.

1.7.2  Production and coordination costs Any actor engaging with economic activity incurs two types of costs in any exchange: production costs and coordination costs. Production costs are the costs associated with creating, distributing and sometimes consuming some value. For instance, all the costs associated with galvanisation as a manufacturing process, as well as the costs of shipping finished material back to customers are production costs. Coordination costs are the costs associated with coordinating the action of multiple actors. Hence the costs associated with managing any exchange relationship are coordination costs. The costs Goronwy incurs in communicating with its customers and ensuring that products are processed as and when required are coordination costs. Goronwy will also incur such costs in managing its relationships of supply with Rito Metals. This distinction between production costs and coordination costs helps us understand why ICT is now so embedded within the global economic system. Because ICT can be used to help reduce coordination costs within economic markets, ICT can also help reduce certain production costs for certain types of value.

1.7.3 Value Value traditionally comes in two forms, goods and services. A good or product is some ‘thing’ created as the result of some activity. As such, goods are not dependent on any particular location or time for their existence. As outputs from some activity goods can be inspected, distributed and stored, hence the white material of Goronwy are classic goods. They are created by the production process of Goronwy and once created are independent of this production, meaning that they can be inspected and stored ready for eventual dispatch back to the customer. A service is an activity performed by somebody or something on someone or something else. As an activity a service is time- and location-dependent – it takes place at some time and in some place. Likewise, as activities services cannot be distributed or stored: a medical operation is a classic service. It is conducted by some person or group of persons on some other person – a patient. As an activity it is always performed somewhere (typically within some operating theatre) and at some time (typically within some defined operating schedule).

Copyrighted material – 9781352007381

21


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

1.7.4  Digital and non-digital value The nature of value has been impacted by the increasing application of ICT in many areas. A useful distinction is between goods and services that either are or can be digital and those which are non-digital. Certain goods and services are not amenable to digitisation, to being turned into data, and some are never likely to be so. Hence a steel galvanised product is a nondigital good and is likely to always remain so. Similarly, a medical operation is a physical or non-digital service that is never likely to be digitised. In the case of activity systems which create non-digital goods or services ICT is primarily used to reduce coordination costs. It does this primarily by efficiently managing the flow of data necessary for the proper coordination of activity, such as transactions associated with exchange. Certain other goods and services are amenable to digitisation, to being turned into data or to being conducted at a distance using communication channels. For instance, music and movies can still be experienced as a non-digital good and even a non-digital service. You can still buy a CD or a DVD as a commoditised good and you can still attend a music concert or a cinema presentation of a movie. But we know as ‘content’ both movies and music are effectively data and can be created, distributed and consumed as such through services such as music and movie streaming. In the case of digital goods then, ICT can be used not only to reduce coordination costs but also to reduce production costs. For example, once a piece of music is digitised then the cost of distributing the music track to the consumer via a streaming service is close to zero.

1.7.5  Value chain The primary goal of most organisations is to produce or create some form of value. For commercial organisations such value will typically constitute goods. For public sector organisations value will typically consist of the services such organisations provide. Therefore, organisations are value-creating or valueproducing systems. Organisations can be thought of as chains of interrelated activity systems associated with the production and dissemination of value. Michael Porter (1985) has proposed a template for the activity systems of the typical business, known as the internal value chain and consisting of a defined set of primary and secondary activities.

1.7.6  Value network Organisations consist of a series of interdependent chains made up of related activity systems that deliver value. Organisations, as systems, also exist within a wider value network consisting of chains of value between the organisation and external actors. Types of such external business actors include customers, suppliers and partners. This means that five value chains are significant for most businesses: ●● The internal value chain consisting of a series of activity systems by which the

organisation creates value.

●● The supply chain consisting of those activity systems by which an organisation

obtains goods and services from other organisations.

●● The customer chain consisting of those activity systems by which an organisation

delivers value to its customers.

22

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems ●● The community chain consisting of those social networks surrounding the business

that support value generation between individuals and groups.

●● The partner chain consisting of those activity systems that support coordinated or

collaborative value creation by two or more organisations to the same set of customers.

Consider the value network of Tesco plc, a major supermarket chain. The internal value chain of Tesco involves all those activities that contribute to the retail of foodstuffs to its customers. The customer chain involves activities devoted not only to the operation of its supermarket stores but also to its operation of online grocery. As a food retailer Tesco has a large and complex chain of activities devoted to getting foodstuffs from its suppliers to its stores and warehouses. Tesco operates a loyalty scheme as part of its community chain as a means to retain its customers. Finally, Tesco is in partnership with a range of other companies such as in areas like insurance and Internet service provision.

1.7.7 Commerce Commerce consists of the exchange of products and services between businesses, groups and individuals. Therefore commerce or trade can be seen as one of the essential activities of any business. Commerce of whatever nature can be considered as an activity system of exchange between economic or business actors with the following generic activities: pre-sale activities occurring before a sale occurs; sale execution comprising activities involved with the actual sale of a product or service between economic actors; sale settlement involving those activities which complete the sale of a product or service; and, after sale, consisting of those activities which take place after the buyer has received the product or service from the seller.

1.8  DIGITAL BUSINESS Traditionally, ICT has been used to improve the operation of the activity systems making up the internal value chain of the organisation. More recently, ICT has also been used to improve activity systems between the organisation and its wider value network. The application of digital computing and communications technology to organisational issues in the private sector is sometimes known as digital business. We use this term to encompass two other related terms, electronic business (eBusiness) or electronic commerce (eCommerce). The two are not the same. eCommerce refers to the use of ICT to enable activities within the wider value network. We use eBusiness as a term for the use of ICT to enable both internal and external activities. In Figure 1.14, to represent the electronic exchange of data structures upon which eCommerce relies, we have a communication symbol connecting the ICT system of the external actor with the ICT system of the organisation.

1.8.1 eBusiness An electronic business (eBusiness) is a business in which the use of ICT is critical to supporting both its internal value chain and its external value network. The internal value chain consists of the series of activity systems by which the organisation delivers a product or service to its customers. The external value network consists of the activities, relationships and flows of value between the organisation and actors in its external environment. Copyrighted material – 9781352007381

23


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

ORGANISATION ACTIVITY SYSTEM

INFORMATION SYSTEM

VALUE

Data

VALUE

ICT SYSTEM

EXTERNAL ACTOR ICT SYSTEM

Figure 1.14  Digital business

1.8.2 eCommerce Generally, we may distinguish between four distinct forms of eCommerce corresponding to the application of ICT transformation to major aspects of the value network: to the customer chain (B2C eCommerce), to the supply chain (B2B eCommerce), to the community chain (C2C eCommerce) and to the partnership chain (P2P eCommerce). It is also possible to discuss micro-strategies associated with particular aspects of the customer chain and the supply chain respectively. In this light we consider the importance of eMarketing and eProcurement to modern business. Business-to-consumer eCommerce is sometimes called sell-side eCommerce and concerns the enablement and transformation of the customer chain with ICT. Customers or consumers will typically be individuals, sometimes other organisations. Business-to-business eCommerce is sometimes called buy-side eCommerce and involves supporting and transforming the supply chain with ICT. B2B commerce is clearly between organisational actors – public and/or private sector organisations. Consumer-to-consumer eCommerce concerns the enablement of the community chain with ICT. Partner-to-partner eCommerce concerns the enablement of the partnership chain with ICT. Business organisations now engage in networks of collaboration as well as networks of competition. This means offering a range of different products or services from a number of different businesses at the same time to the same customer through the same access channel.

1.8.3  Electronic marketing and electronic procurement Two key aspects of B2C and B2B eCommerce respectively are important because of their contemporary significance as key digital strategies for improving organisational performance: eMarketing and eProcurement. The Internet and Web offer innovative ways of engaging in pre-sale activity with the customer. One of the most significant of such innovations over the last decade has been the growth in the electronic marketing (eMarketing) of goods and services. As part of B2C eCommerce, eMarketing is an important way of impacting upon the efficiency and effectiveness of the customer chain. eMarketing not only involves the use of electronic channels for the delivery of promotional 24

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems material; it also involves the conception and pricing of products and services. In the case of B2B eCommerce, engaging in electronic procurement (eProcurement) is an important way to improve the efficiency and effectiveness of an organisation’s supply chain. The pre-sale activity of search, negotiate and order in the supply chain is frequently referred to under the umbrella term of procurement. Sometimes the term procurement is used to refer to all the activities involved in the supply chain.

1.8.4  Digital business at Goronwy For Goronwy, it is possible to show how the introduction of the new ICT system led to the establishment of its parent company, Rito Metals, as an eBusiness. Goronwy’s new ICT system continued in operation for a couple of years, then Rito Metals carried out an evaluation. It concluded that the system had improved the plant’s performance in a number of ways, as we have seen. Executives at headquarters made a strategic decision to roll out the ICT system to all 10 galvanising plants in the group. As well as wanting to improve the information handling at the plants, they wanted to see them using standard activity systems. This rollout took a further two years to complete, as some plants found it difficult to adapt. When it was complete it became possible to create a management information system (MIS) at headquarters, fed with data from the individual plant ICT systems. To enable this, a dedicated wide area communication network was created, linking each plant with headquarters. Now Rito Metals could carry out more effective strategic management of its galvanising plants, because it was able to obtain an accurate and up-to-date picture of operations and problems at particular plants, making them easier to identify and rectify. In this sense, the MIS enabled more effective control of the separate business units. In developing an integrated ICT and information systems infrastructure, Rito Metals moved in the direction of becoming an eBusiness, because the use of ICT became critical to supporting its internal value chain. Goronwy itself also went down this route in the mid1990s. It started by introducing handheld devices for inbound and outbound logistics operatives, linked via a plant wireless communication network. The workers could use these devices to access data from the central system, and update it with data about the receipt and dispatch of goods.

CASE

1.9  SOCIAL MEDIA Digital infrastructure within and between organisations continues to evolve, sometimes in directions which it is quite difficult to predict, such as in the case of social media. It is actually difficult to pinpoint precisely what is meant by this term. The term social media is often used to refer generally to any means for creating and sharing of digital content, such as written material, photographs, video and audio material. But the term social media is also associated with the sharing of such content via online social networks. Certain characteristics of social networks, such as the network effect, strong and weak links, and social capital make social media particularly attractive to business.

1.10  MOBILE COMMERCE Another key change to digital infrastructure that has occurred over the last decade is the movement towards mobile commerce. Mobile commerce can be considered a subset of electronic commerce, and in particular of B2C eCommerce. It relies upon a number of aspects of technological infrastructure. Various mobile access devices may be used by the consumer, such as smartphones or tablets. Such devices use positioning Copyrighted material – 9781352007381

25


Copyrighted material – 9781352007381 Introduction: the domain of business information systems systems which typically exploit features of the cellular phone network to engage with location-based services. The interface to the ICT system normally runs as an app on the mobile device. Requests to the ICT system travel as IP messages over the cellular telephone network. Most of the ICT system itself runs within a cloud data centre, which services the requests made by the customer. The ICT system may enact further requests to other cloud services, such as electronic payments.

1.11  DESIGNING DIGITAL ORGANISATION As we have seen, within this book organisation is considered a complex adaptive system. The institution of organisation emerges from patterns of action that serve to constitute organisation. Organisations as systems can achieve their goals or purposes in a multitude of different ways. This means that there are likely to be different patterns of organisation that meet the same defined objectives or goals. The consequence of this way of thinking is that we should approach all forms of organisation in terms of a design orientation. In other words, we should be able to design different patterns of organisation and then evaluate which is the most appropriate pattern for resolving aspects of some problem situation. There are a lot of different ways of thinking about design as an activity. Many divide the activity of design in two ways, such as problem-setting and problem-solving. ­Problem‑setting means establishing the problem to be engaged with. This is often the most difficult part of design because it typically involves determining not only the boundaries of the problem to be solved but the purpose to be served by any solution. This demands that the problem situation is investigated or analysed using participation, conversation, observation and/or documentation. It also means determining the motivation for making changes to existing problem situations. Problem-solving involves specifying changes to patterns of action, particularly by visualising how the new proposed system of organisation will pan out as a narrative or story. This means suggesting what happens, when and where things happen, who makes things happen, and how and finally why things happen.

1.12  DIGITAL INNOVATION AND DIGITAL STRATEGY The notion of the organisation as a complex and adaptive system is inherently one which accommodates change. Organising is a continuous accomplishment performed by actors which continually produces and reproduces organisation. This book is all about change through innovation and, in particular, digital innovation – innovating with or through ICT (Figure 1.15). Strategy and innovation are clearly related. Strategy is about deciding what change is necessary and what steps will be taken to achieve such change. Change is normally conducted in order to innovate – to make a difference. This helps us relate together issues of both digital innovation and digital strategy through the mediating concept of a digital business model.

1.12.1  Business models The concept of a business model has been much considered in the wider literature, particularly in terms of much recent management writing which attempts to make sense of strategy in times of rapid technological change. Not surprisingly, business models have been particularly used as a way of understanding the impact of innovation with ICT upon business practices – an area referred to traditionally as electronic business and electronic commerce but more recently as digital business. 26

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

DIGITAL STRATEGY, MANAGEMENT AND OPERATION

EVALUATION

IMPLEMENTATION

ACTIVITY SYSTEM

CONSTRUCTION

DESIGN

ANALYSS

ORGANISATION

CONCEPTION

DEVELOPING DIGITAL ORGANISATION

INFORMATION SYSTEM ICT SYSTEM

Figure 1.15  Digital innovation These features closely align to our notion of organisation as a system and also to elements of design thinking. A business model is a way of expressing the core design for some value-creating system. This design must outline the system of action necessary for the achievement of the goals of organisation. We have seen that there are three layers of action that make up organisation as a system, and serve interdependently to create value, the central goal of organisation. As a system, organisation consists of three interrelated patterns of action which can be described as narratives or stories of ways of organising. An activity pattern consists of sequences of coordinated, instrumental activity. A communication (information) pattern consists of sequences of communicative acts. An articulation (data) pattern consists of sequences of manipulating data structures. All three patterns or subsystems are needed to express a business model, as well as some notion of how these patterns interrelate.

1.12.2  Strategy and motivation We can analyse some existing domain of organisation and build a business model which expresses how things work currently – an as-is business model. We can also express a business model as a design: as how we would like things to be – as an as-if model. Because of the nature of organisation as a system there is potentially a large range of asif business models for any one as-is business model. Each of these as-if models may be able to achieve the same purpose, but clearly in different ways. Clearly, to enact change, one of these as-if models must be chosen as a to-be model. This then becomes a design for a new domain of organisation that will hopefully be implemented in practice. The concept of a business model also allows us to distinguish between business motivation and business strategy. Business motivation involves the need to document explicit reasons for changing an existing (as-is) business model, such as enhancing revenue or better adapting to market changes. The nature of organisations as open systems means that more than one envisaged (as-if) business model may fulfil one or more aspects of expressed motivation. Business strategy involves optimising the selection among as-if models and specifying courses of action to implement a new (to-be) business model for the chosen domain (Figure 1.16). Copyrighted material – 9781352007381

27


Copyrighted material – 9781352007381 Introduction: the domain of business information systems AS-IF business model ACTIVITY SYSTEM INFORMATION SYSTEM ICT SYSTEM TO-BE business model

AS-IS business model

ACTIVITY SYSTEM

ACTIVITY SYSTEM INFORMATION SYSTEM

Business motivation

ICT SYSTEM

Business strategy

INFORMATION SYSTEM ICT SYSTEM

AS-IF business model ACTIVITY SYSTEM INFORMATION SYSTEM ICT SYSTEM

Figure 1.16  Business models, motivation and strategy

1.12.3  Digital innovation Much modern innovation is clearly digital innovation – innovation with and through ICT. ICT has been applied in various domains of organisation to do things differently, and as such these examples of innovation are prime instances of disruptive innovation or creative destruction. However, to innovate successfully with ICT we have to look rather differently at ICT; we have to challenge conventional ways of thinking about ICT. Traditionally, technology (such as ICT) is seen as something separate from business activity, but which supports such activity. This viewpoint suggests that to undertake digital innovation you should design changes to activity first and then design ICT systems to support activity change. Throughout this book we have suggested thinking differently about ICT as a participant actor within contemporary ways of organising, alongside humans.

1.12.4  Goronwy digital innovation

CASE

28

Goronwy initially invested in a limited corporate website which merely promoted its services and provided contact details. It then created a companion website specifically for repeat customers such as Blackwalls, so they could enter details of orders and track their progress from receipt through galvanisation to dispatch. To enable fully transactional websites, organisations need to update the data dynamically from back-end databases, and to ensure that data entered by stakeholders update the company information systems effectively. So, when a customer inputs delivery details, this information needs to be available to all the other systems that need it. This

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Introduction: the domain of business information systems

CASE continued…

demands integration and interoperability of front-end and back-end systems within the ICT infrastructure. For Goronwy, the back-end ICT infrastructure managed the data structures we described above as well as the business rules, update functions and transactions critical to what we referred to as the business layer. After 10 years of operation, Goronwy decided to upgrade its ICT system onto a new hardware and software base, to make it easier to develop web interfaces and integrate them with a central corporate database system. The system was redesigned and rewritten, and the company also invested to ensure the privacy of electronic data held in the system, and the security of transactions travelling both within Goronwy and between Goronwy and the central ICT systems at Rito Metals. This continual investment in the ICT infrastructure is evidence of its growing value to the performance of the business.

1.12.5  Business evaluation One key lesson is that it is important for organisations to evaluate their ICT systems and their impact on activity systems. Strategic evaluation involves assessing the system’s potential for delivering benefit against estimated costs. Formative evaluation involves assessing the shape of an information system during the development process. Summative evaluation involves returning to the costs and benefits established in strategic evaluation after a period of use. A variant of this is post-mortem analysis, summative evaluation of a failed information system project to determine lessons for organisational practice.

1.13 CONCLUSION This chapter is meant as a high-level summary of the topic areas covered in the rest of the book. So here is how we intend to consider the domain of business information systems. We start by looking at what organisation means in systems terms. This leads us to identify the coordination of activity as a key problem that all organisation faces (Chapter 2). Effective coordination relies upon effective communication, so we consider what information means in terms of communication. To communicate about some thing we must make differences within some substance – this is the essence of data (Chapter 3). Information systems have been around for many thousands of years. ICT has only been around for some 50 years or more and applied to information systems. The place of ICT can only be understood in terms of wider infrastructure of organisation (Chapter 4). Data (ICT), information and activity systems may be coupled vertically as well as horizontally to form such infrastructure. Modern organisation relies heavily on effective ICT infrastructure. This book considers such infrastructure in terms of access devices and channels, communication networks, front-end and back-end ICT systems, and data management (Chapter 5). Organisations are not isolated entities, they are open systems. This means that the success of any organisation will depend on how well it integrates with aspects of its environment. This book focuses primarily on the economic environment of the organisation and describes ways in which organisations can be considered as systems producing value that travels within and between them (Chapter 6). But ICT is critically embedded not only within the modern economy but also within society and polity. We use the term digital business to refer to any ICT application within business. As such it encompasses two older terms, electronic business and electronic commerce. Copyrighted material – 9781352007381

29


Copyrighted material – 9781352007381 Introduction: the domain of business information systems In this chapter we focus upon electronic business and electronic commerce. Electronic business (eBusiness) involves any ICT-enablement of an organisation’s internal value chain, as well as its external value network. In contrast, electronic commerce is a subset of eBusiness, and refers to ICT-enablement solely of aspects of the external value network of some organisation (Chapter 7). As more interaction with organisations occurs online, more and more potential exists for use of electronic channels for marketing purposes. Electronic procurement as a form of digital innovation is seen as a means of reducing major supply chain costs to companies and to public sector organisations (Chapter 8). We also consider some of the more recent digital innovations that have or are impacting upon organisations of many different forms. We have a look not only at some more established areas, such as mobile commerce and social media as key examples of digital business, but also some innovations that are likely to impact upon organisation in the near future (Chapter 9). The design orientation gives us a useful way of approaching the design of digital organisation. As we shall see, this fits well with the systemic and action-oriented view of organisation promoted in this book (Chapter 10). This book is all about innovation and, in particular, digital innovation – introducing change with or through ICT. Crucial to managing change and innovation is the concept of a business model. The notion of a digital business model allows us to relate the motivation for innovation as well as the strategy for change (Chapter 11). Since ICT is embedded in modern organisational life as well as in the wider environment, not surprisingly ICT is a vast industry of both producers and consumers. In consuming organisations there is normally a function charged with developing, maintaining and operating the ICT infrastructure in support of information systems, which we shall refer to for convenience as the ICT service (Chapter 12). In the final chapter we provide an overview of certain aspects of ICT change that are likely to affect the nature of digital infrastructure over the next decade or so – such as ubiquitous computing, artificial intelligence and new architectures for computation. We can better make sense of the changes to digital infrastructure if we apply coherent theory. This is why we bring together elements of a theory of information systems in this final chapter. This summarises our perspective on what information and information systems are, and also helps us not only better understand the potential digital future but also presents us with better ways of approaching the design of such future (Chapter 13).

Visit www.macmillanihe.com/beynon-davies-BIS3 to access extra resources for this chapter

30

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381

INDEX Page numbers in bold type indicate Glossary terms.

AACSB, xxiv Access, 19, 68, 134, 159–162, 188, 195, 208, 212, 218, 251, 253, 273, 275, 336, 419, 420, 422, 423, 431, 437, 439 Access channel, 24, 162, 167, 171, 183, 212, 257, 337, 422 Access device, 25, 29, 134, 135, 137, 140, 142, 149, 153, 156, 157, 162, 167, 171, 173, 175, 182, 188, 213, 234, 263, 271, 273, 275, 281, 282, 289, 387 Accounting information system, 116 Ackoff, Russell, 292 Action perspective, 32, 33, 35, 55 Activity, 14, 17, 20, 21–29, 32, 34–36, 38, 39, 41, 43–45, 50–55, 68, 72, 101–105, 116, 119, 129, 145, 154–159, 168–171, 178, 186, 189, 190–193, 195, 209, 216, 224, 229, 235, 239–241, 245, 251, 253, 266, 287, 290, 294, 301, 309, 313, 317, 323, 329, 334, 338–342, 345, 364, 367–371, 380–382, 390–392, 407–412, 424, 425 Activity system, 6, 8–9, 19, 20, 23, 44, 46, 49, 54, 55, 68, 98, 102, 107, 115, 129, 148, 159, 178, 190–193, 200, 202–206, 230, 248, 251, 261, 277, 278, 286, 302, 308, 309, 316, 324, 328, 334, 346, 368–370, 374, 381, 411, 422, 425, 429, 450 Activity systems infrastructure, 100 Activity-based project planning, 310 Actor, 6, 8, 13, 20, 21, 23, 28, 36, 38, 40, 41, 51, 64, 70, 75, 78, 80, 82, 83, 87, 92, 93, 116, 147, 148, 158, 168, 190, 214, 243, 249, 297, 305, 315, 321, 341, 342, 345, 359, 380, 392–394, 396, 402–408, 417, 420, 432 Adaptation, 31, 37, 47

Adjunct communities, 219, 221 Aftersales service, 17, 111, 130, 178, 418 Aldrich, Michael, 214 Alexander, Christopher, 31, 40 Algorithm, 84, 88, 89, 160, 234, 235, 238, 395, 396, 421, 430 Alibaba, 32, 223, 416–417 Alignment, 338–339, 366 Al-Khwarizmi, Musa, 88 Amazon, 37, 151, 203, 214, 215, 217, 223, 271, 279, 280, 417–420 Analogue signal, 63 Analysis. See Business Analysis App, 26, 29, 269, 271, 274–276, 280, 305, 395, 396, 420 Apple, 174, 178, 271, 359, 419–420, 422 Application, 6, 23, 54, 134–136, 147, 148, 151, 162, 171, 177, 181, 187, 208, 229, 248, 268, 271, 316, 360, 364, 371, 375, 386, 390, 396, 413, 422, 423, 430, 431, 438 Application service provider, 360, 371 Application software, 375 Appreciative system, 278, 292 Arab Spring, 264–266 Aristotle, 36, 349 Articulation, 14, 17, 18, 27, 36, 40–43, 51, 55, 60, 69–71, 73, 86, 98, 99, 101–103, 105, 109, 135, 144, 147–150, 174, 229, 244, 301, 323, 330, 339, 341, 342, 403, 406–408, 410, 411 Articulation act, 341, 406 Artificial Intelligence, 30, 50, 88, 391–397, 421 ASCII, 67 Assertive, 13, 82, 83, 86, 111 Association, 50, 81, 155, 158, 234, 235, 254, 255, 374, 411, 422 As-if model, 27, 323, 326, 330, 345–346, 354, 355 As-is model, 326, 330

Copyrighted material – 9781352007381

Attribute, 37, 38, 66, 80, 81–82, 105, 125, 154, 158, 175, 206, 221, 343, 421, 422, 437 Auction, 221–223, 247, 417, 430 Authentication, 2, 156–158, 161, 162, 193, 343, 412 Authorisation, 160, 162, 243, 379 Awareness, 265 Axiology, 169, 172, 239, 278 B2B. See Supply Chain B2B eCommerce, 24, 25, 200, 207, 216–218, 224, 229, 240, 243, 418, 419 B2C. See Customer Chain B2C eCommerce, 24, 25, 155, 200, 207–208, 210, 212, 214–217, 224, 229, 233, 271, 273, 278, 346, 404, 416, 419, 434 Back-end ICT infrastructure, 29, 162, 428 ICT system, 29, 162 information system, 17, 98, 99, 114, 118, 121, 123, 130, 178, 209, 210, 373 information systems infrastructure, 99, 114–118 Balancing feedback. See negative feedback Banner advertisement, 223, 234, 235, 238 Barcode, 80, 81, 243, 338 Beck, Harry, 50, 289 Beer, Stafford, 287 Beer distribution game, 240, 241 Benchmarking, 349 Berners Lee, Tim, 140, 214, 219 Bespoke development, 371 Bezos, Jeff, 214, 215, 417, 418 Big Data, 134, 154–156, 235, 397, 411, 441, 442 Bit, 398, 412 Bitcoin, 151, 174, 175, 177 Bio-computing, 400

467


Copyrighted material – 9781352007381 Index Blockchain, 175, 177 Blog, 265 Bookings, 72, 90, 144, 304 Boole, George, 147 Boolean logic, 147 Brainstorming, 294, 298 Branding, 451 Bricks and mortar business, 214 Brin, Sergey, 237, 238, 430 British computer society, 50, 361 Broadband, 2 Brooks, Frederick P., 436 Browser, 40, 152, 153, 161, 162, 237, 263, 395, 419, 420, 439 Brynjolfson, Erik, 278 Buchanan, Richard, 289 Buckminster Fuller, Richard, 287 Bush Vannevar, 136 Business analysis, 50, 129, 147, 286, 296–298, 306, 308–310, 317, 323, 329, 331, 350–354, 360, 369 Business design, 50, 55, 129, 298, 302, 308, 323, 331, 360 Business end, 332 Business evaluation, 29, 349–354 Business layer, 18, 19, 29, 143 Business means, 335–336 Business model, 26, 27, 30, 50, 51, 207, 210, 214, 216, 218, 221–223, 249, 277, 282, 297, 309, 317, 321, 322–331, 336, 345, 346, 349–355, 417, 418, 420–422, 435–439, 441 Business motivation, 27, 309, 321, 323, 326, 330, 331, 336, 345, 346, 350, 354, 355 Business process, 55, 129, 152, 322, 340, 375, 379 Business process re-engineering, 340 Business rule, 19, 20, 20, 29, 143, 147, 162, 250, 336 Business sign, 78, 81–82 Business strategy. See Organisation Strategy Business transaction, 144 Byte, 66, 67, 70, 93, 154, 155, 238, 413 C2C eCommerce, 24, 200, 218, 219, 221, 224, 229, 422 C2C eGovernment, 253, 255, 256 C2C exchange, 221, 222, 224 Cambridge Analytica, 221, 269 Cardiff university, 32, 33, 432 Carroll, Lewis, 42, 59, 349 Cash commerce, 203, 204, 210, 224

468

Category mistake, 406 Cellular network, 26, 136, 271, 281 Change management, 309, 330, 428, 429, 442 Channel strategy, 452 Character set, 452 Chat, 220, 268, 269, 423 Chatbot, 267, 305 Checkland, Peter, 44, 292 Chief information officer, 363 Child support agency, 427 Churchman Charles, West, 288 CIO. See Chief information officer Citizens advice, 249, 253 Class. See Information class Click per acquisition, 235, 256 Clicks and mortar business, 214, 346 Clicks-only business, 405 Client, 152, 153, 161, 175, 247, 326, 328, 368, 370, 441 Client-server, 161 Closed system, 452 Cloud, 26, 271, 273, 281, 282, 380, 382, 419, 434 Cloud computing, 151–154, 155, 156, 162, 378, 381, 382, 418, 419, 434 COBIT, 374, 375 Coding, 63, 64, 67, 69, 70, 84, 92, 242, 248 Commerce, 1, 23–26, 29, 30, 156, 168–171, 173, 177, 179, 182, 195, 200–207, 209, 210, 216, 218, 219, 222, 224, 229, 239–242, 260, 271, 273, 279, 281, 282, 323, 328, 376 Commercial Web, 134, 150–151 Commissive, 13, 82, 86, 89 Commodity code, 242 Communication, 2, 3, 9, 10 Communication channel, 22, 38, 75, 134, 136–137, 142, 162, 171, 173, 190, 231, 234, 266, 269, 390, 422 Communication network, 25, 29, 38, 134, 136–139, 143, 151, 155, 162, 175, 186, 219, 220, 281, 367, 379, 387 Communication subsystem, 143 Communication technology, 2, 13, 32, 332, 359, 368, 378, 385, 391 Communicative act, 13, 14, 27, 38, 78, 82, 83, 86, 87, 89, 90, 92, 93, 114–116, 323, 341, 342, 411 Community chain, 23, 24, 166, 167, 181, 183, 195, 200, 203, 207, 218, 219, 224

Comparator, 388 Competitive position, 167 Competitor, 329, 433 Complex adaptive system, 26, 55, 178, 179, 317, 322 Complex data, 67, 84, 400 Concept, 26, 27, 30, 31, 33, 36, 37, 44, 55, 60, 78, 93, 98, 134, 135, 153, 162, 169, 177, 195, 206, 214, 219, 223, 249, 266, 281, 292, 306, 310, 321–323, 338, 354, 366, 406, 407, 411 Conception. See Systems Conception Construction, 64, 309, 368, 369, 370, 373, 396, 402, 426, 439 Consumer of ICT, 360 Content, 13, 22, 25, 59, 77, 78, 81–83, 92, 93, 140, 150, 151, 172, 178, 184, 187, 209, 212, 214, 220, 230, 233, 234, 237, 239, 240, 253, 260, 262, 263, 266, 269, 280, 282, 315, 326, 328, 353, 370, 403, 412, 413, 417–420, 422–424, 430–432, 438 Content management, 165 Control, 17, 20, 25, 31, 46–48, 60, 61, 111, 121, 127, 130, 146, 156, 161, 191, 206, 221, 241, 249, 286, 291–293, 313–315, 345, 387, 389, 390, 393, 394, 411, 412, 421, 424 Control inputs, 47, 387 Control process, 119, 191, 249 Control sub-system, 48, 293 Convention, 44, 45, 79, 229, 339, 340, 406 Conversation for action, 89 Coordination, 8, 13, 14, 17, 21, 22, 29, 35, 38, 40–45, 55, 72, 86, 87, 89, 90, 93, 98, 100, 101, 105, 107, 125, 146, 148, 171, 173, 177, 178, 195, 205, 217, 228, 229, 240, 248, 249, 262, 266, 274, 304, 314, 323, 330, 332, 335, 339, 341, 403, 407, 408, 410, 435, 441 Coordination act, 43 Coordination cost, 21, 22, 146, 171, 173, 177, 178, 195, 205, 206, 228, 240, 248 Coordination problem, 44, 45, 101, 107, 274, 304, 314 Cost Advantage, 337 Cost per acquisition, 237 Cost-Benefit Analysis, 352

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Index Coupling, 101, 408 Create (articulation), 5, 19, 20, 22, 25, 27, 35, 41, 44, 61, 67, 70, 144, 149, 301, 323, 342, 404 Credit commerce, 203, 204, 209, 224 Critical path, 310 Critical success factor, 334 CRM. See Customer Relationship Management Crowdsourcing, 281, 438 Customer, 5, 21–24, 26, 28, 48, 111, 114, 117–119, 121–128, 130, 146, 173, 177, 179–183, 195, 200, 203, 206–218, 221–224, 241–243, 248–251, 271, 275, 280, 290, 304, 328, 333–335, 342, 346, 366, 376, 387, 418–420, 422, 427, 428, 434, 435 Customer acquisition, 211 Customer chain, 22–24, 111, 122, 126, 166, 179, 180–183, 195, 200, 203, 206, 207, 211, 215, 224, 250, 255, 419, 422, 428 Customer extension, 211, 212 Customer profiling and preferencing, 211 Customer relationship management, 17, 122, 124, 126, 130, 153, 156, 210–215, 217, 224 Customer relationship management system, 124 Customer resource life-cycle, 328 Customer retention, 122, 211, 212 Customer-facing information system, 17, 122, 123, 130 Cwmni, 326–328, 331 Cyber-bullying, 260, 267, 423 Darknet, 151 Darkweb, 151 Data administration, 363 analytics, 154–156, 441, 442 element, 18, 19, 65, 66, 72, 73, 93, 143, 144, 174, 175 exhaustivity, 154, 155 flexibility, 154 flow, 170, 205, 241, 315 format, 20, 67 indexicality, 154 infrastructure, 125, 441 integrity, 3, 160 item, 16, 66, 78, 175 layer. See Data management layer

management, 18–20, 29, 134, 144, 145, 155, 157, 162, 173, 373, 437 management layer, 18–20, 157, 373, 437 mining, 442 model, 18, 72, 95, 144 privacy, 156, 189, 221, 255, 273, 343, 424 protection, 153, 189, 343, 424, 438 relatability, 154, 155 resolution, 154 security, 83, 134, 156, 157, 162, 390, 420 store, 116, 117, 119–121 structure, 10, 16, 18–20, 65–68, 70–72, 75, 111, 116, 143–145, 173–175, 177, 189, 237, 240, 254, 275, 302, 341, 400, 406, 408, 409, 411–413 subsystem, 143, 152, 271 system, 10, 13, 14, 17, 18, 31, 36, 59, 60, 70–75, 84, 93, 98–101, 103, 105, 108 system infrastructure, 125–128 type, 67 variety, 154 velocity, 154 volume, 154, 155 Database, 13, 18, 19, 20, 28, 29, 66, 116, 127, 140, 144, 145, 147, 154–157, 160, 162, 164, 209, 210, 234, 338, 363, 370, 378, 326, 431, 437, 441 Database administration, 150, 160, 279, 363 Database management system, 426, 437 Database system, 29, 160 Datum, 13 Davenport, Michael, 201 Da Vinci, Leonardo, 40 DBMS. See Database Management System De Bono, Edward, 339 Decision, 17, 20, 25, 35, 48, 49, 51, 54, 70, 72, 75, 84, 86–93, 108–111, 118–120, 130, 161, 169, 191, 207, 222, 233, 289, 298, 306, 316, 317, 336, 346, 352, 373, 393, 395, 402, 409, 426, 428, 434, 437, 439 Decision point, 92, 300, 337, 316, 317 Decision strategy, 48, 49, 88, 393, 403 Decision support system DSS. See Executive Information System

Copyrighted material – 9781352007381

Decision-making, 10, 14, 17, 43, 51, 55, 59, 60, 88, 90, 92, 93, 98, 107, 118, 119, 129, 134, 155, 156, 190, 205, 241, 278, 292, 297, 302, 307, 312, 342, 353, 364, 374, 411, 433, 437 Declarative, 14, 82, 83, 86, 89 Delete (Act of articulation), 10, 19, 70, 71, 75, 103, 144, 239, 388, 409, 439 Demand chain. See Customer Chain Dennett, Daniel, 393, 402 Design. See Business Design Design artefact, 286–291, 299 Design orientation, 26, 30, 286, 287, 317, 322 Design science, 286–291 Design theory, 286, 288–291, 299 Design workshop, 297–298 Development failure, 424, 426, 427, 428 information system, 368 method, 151, 290, 315, 368 organisation, 455 process, 29, 314, 352, 366, 369, 370, 372, 373, 426 technique, 352, 368 toolkit, 368 Differentiation strategy, 337 Digging up the cowpaths, 340, 345 Digital by default, 167, 190, 195, 251 certificate, 161 currency, 174, 175, 198 democracy, 167, 190 divide, 419. See also digital exclusion ecosystem, 260, 261, 273, 279–281, 418, 420, 441 exclusion, 188, 189, 442 good, 22, 166, 171, 173, 195, 210, 418 innovation, 26, 28, 30, 44, 140, 179, 190, 193, 195, 201, 216, 229, 260, 261, 277, 278, 281, 282, 287, 291, 299, 301, 305, 321–355, 360, 409, 421–422 native, 20, 168, 266, 281, 346, 434 polity, 20, 166, 167, 189, 262 service, 171, 273 signal, 63 strategy, 26–29, 287, 321, 322, 338, 339, 346, 349, 354, 363–366, 441, 443

469


Copyrighted material – 9781352007381 Index Directive, 13, 82, 83, 86, 87, 89, 90, 111, 116, 240, 274, 297, 335, 336 Discourse, 50, 296, 297, 322 Disintermediation, 177, 181–183, 226, 250, 267 Disruptive innovation, 28, 256, 260–282, 341, 441 Division of labour, 361, 362 Domain model, 5, 6 Domain name, 162, 209, 346, 370, 403, 423, 432–434 Domesday Book, 60, 132 Doomsayers, 396, 397, 414 Dorsey, Jack, 438 DNA, 158, 385, 398, 400, 401, 413 Dunbar, Robin, 187 eBay, 222–223, 416–417 eBusiness, 23, 25, 30, 168, 201, 226–228, 256 eCommerce, 23–25, 155, 168, 200, 207–208, 210–212, 214–219, 221–224, 229, 233, 240, 243, 271, 273, 278–279, 346, 370, 404, 416–419, 422, 434–436, 443 eCommunity, 219 Economic actor, 20–21, 23, 167–168, 170, 174, 195, 202, 207, 224, 240, 332 Economic environment, 29, 47, 168, 230, 332 Economic system. See Economic Environment eDemocracy, 190 EDI, 242 Effectiveness, 24, 25, 43, 45, 46, 193, 233, 235, 237, 243, 306, 307, 312, 317, 334 Effector, 387, 393, 394, 403 Effector apparatus, 393–394, 403 Efficacy, 45–46, 193, 243, 345, 352, 419. See also Utility Efficiency, 24–25, 45–46, 146, 193, 217, 243, 245, 251, 306, 328, 345, 351–352, 367, 381, 387, 419 eGovernment, 190, 228, 249–251, 253, 255–256, 279, 428 EIS. See Executive Information System Electoral activity system, 191 Electronic commerce. See eCommerce community, 218–219, 224 delivery, 255 government. See eGovernment marketing. See eMarketing

470

procurement. See eProcurement sourcing, 200, 216, 218, 224, 228, 247 Email, 2, 18, 66, 89, 138, 158, 162, 190, 208, 210, 212, 220–221, 223, 231–234, 237, 263, 269, 376, 378, 419, 422, 423, 424, 430–431 Email protocol, 162 eMall, 456 eMarket, 456 eMarketing, 24, 235, 376, 430 Emergence, 33–34, 36 Emergency response service, 82, 114, 345 Employability, 397 Employee-facing information system, 118, 121, 156 eNabled Community, 219 Encryption, 83–84, 157, 160–162, 400 Enigma machine, 83–84, 161 Enrolment, 156, 159, 255, 343 Entanglement, 398–399 Enterprise resource planning system, 125 Entropy, 42, 277, 402 Environment, 1, 3–4, 6–7, 20–21, 23, 29, 30, 31, 38–39, 47–48, 50, 157, 161, 162, 166–195, 212, 220–221, 230, 262, 292–293, 298, 329, 331–332, 337, 359, 364–366, 378, 380–382, 385, 387, 389, 393–394, 402–403, 408, 436 eProcurement, 24–25, 240, 256 Equifinality, 45, 290, 304, 306, 322–323, 326, 345, 408 eShop, 456 Ethics of digital innovation, 278–279 Evaluation, 25, 29, 31, 45–46, 72, 82, 243, 245, 247, 290, 309, 313, 317, 322, 328, 330, 349–354, 364–365, 369, 429 Executive information system, 120 Expectation failure, 456 Expressive, 82, 83, 86, 89, 297 Extranet, 147–148, 150, 162, 247 Facebook, 151, 181, 219–221, 235, 262–269, 278–279, 395, 422–424, 443 Facial expressions, 65, 77, 79, 353 Failure in public sector ICT infrastructure, 424 Faraday, Michael, 135 Feasibility study, 369

Feedback, 48, 50, 89, 206, 223, 328, 370 File, 136, 145, 173, 223, 237, 281, 387, 421 Firewall, 157, 161 Five forces model, 456 Floridi, Luciano, 406, 413 Focus group, 297 Foreign key, 125 Formative evaluation, 29, 313, 350–353 Forrester Jay, 240 Front-end ICT infrastructure, 29, 114 ICT system, 29, 136–138, 140, 142, 161–162, 373 information system, 17, 98–99, 118, 122, 124–125, 210 information systems infrastructure, 17, 118, 130, 373 Functionality, 19–20, 98, 148–150, 152, 154, 162, 210, 214, 262, 268, 271, 273, 356, 370–371, 417, 420, 423, 425–427 G2B eGovernment, 251, 255–256 G2C eGovernment, 250, 256 G2G eGovernment, 251, 255–256, 279 G2P eGovernment, 253 Garfinkel, Harold, 341 Gatekeeper, 237–239, 266, 430, 431 Gates, Bill, 433, 434 General data protection regulation, 189 General systems theory. See Systemics Giga-byte, 67 Good, 5, 18, 21–22, 41, 49–50, 54, 88, 122, 127, 169–173, 185, 204–205, 212, 214, 221, 235, 238–239, 261, 278, 288, 291, 297–298, 302, 330, 332, 352, 359, 381, 396, 401, 410, 418, 421, 431, 438 Google, 151, 153, 235, 237–239, 271, 279, 381, 395–396, 430–432, 439 Goronwy galvanising, 7–8, 13, 14, 44–46, 48, 79, 83, 144–145, 150, 243, 277, 334, 403, 406–407 Government, 2–3, 83, 111, 127, 135, 159, 166–168, 177, 189–191, 195, 228–256, 265–266, 305, 315, 332, 342–343, 360, 376, 412, 424, 427–429, 432 GPRS, 457 Green ICT, 358–359, 380, 382

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Index Habermas, Jurgen, 269 Haldane, J B S, 167 Hard system, 37, 143 Hardware, 10, 29, 55, 99, 143, 153– 154, 160–162, 359–360, 363–379, 381–382 Heidegger, Martin, 339 Heraclitus, 33, 328 Hesiod, 308 Heuristic algorithm, 88–89, 395 Hierarchy, 39, 169, 205–206, 216, 229, 243, 249, 362, 408 Highway code, 45 Holistic thinking, 37 Hollerith electric tabulating system, 68–69 Hollerith, Herman, 68–69, 279 Holmes, Sherlock, 389 Homeostasis, 457 Horizontal infrastructure, 14, 16, 98, 101, 103, 105 Household waste collection, 301 HTML, 140–142, 150, 162, 234, 242, 262, 370 HTTP, 140, 161–162, 237 Human resource management, 17, 121, 130 Hypermedia, 134, 136, 140, 162 Hypertext, 136, 140, 162 Hypertext Markup Language. See HTML IaaS, 153–154 ICT governance, 374–375 infrastructure, 3, 19–21, 29, 30, 126, 128, 129, 130, 134–136, 148–150, 152–154, 156, 162, 173, 184, 188–190, 216, 247, 250, 253, 266, 274, 280–282, 321, 338, 349, 358–368, 373–382, 401, 419, 424, 427, 428, 437, 438, 441–443 infrastructure service, 361–367 management, 374 service delivery, 376, 379 service improvement, 376, 379 services management, 376, 382 service strategy, 376 service support, 376, 378 strategy, 354, 374 system, 10, 13, 14, 17–20, 23–29, 77, 83, 88, 89, 93, 99, 100, 125, 128, 129, 134, 140, 142–148, 150, 152, 156, 160–162, 173,

234, 247, 260, 271, 273–278, 305, 309, 341, 342, 359, 361, 364, 367–371, 373–375, 407, 426–429, 437 Identification, 156–159, 215, 224, 254, 255, 273, 309, 313, 343, 387, 412, 424 Identifier, 65, 72, 79–83, 139, 145, 154, 158, 159, 223, 254, 255, 411, 412 Imitation game. See Turing test Impact, 14, 22, 24, 26, 29, 30, 37, 135, 148, 166–168, 171, 173, 177, 182, 188, 189, 201, 216, 220, 233, 239, 255, 261, 262, 277, 278, 292, 294, 321, 322, 331, 332, 336, 380–382, 385, 391, 395, 421, 422, 424, 429, 431, 442 Implementation. See Systems Implementation Inbound logistics, 8, 10, 13, 17, 123, 124, 130, 150, 178, 217, 280, 418 Indian identity number, 254–255 Information and Communication Technology, 2, 32, 332 and Communication Technology Infrastructure. See ICT infrastructure and Communication Technology System. See ICT system centre, 363, 366 class, 81, 82, 332, 335 infrastructure, 133 management, xxiii, xxv model, 81 security, 374, 376 situation, 75, 402–407 society, 142, 156, 159, 167 strategy, 458 Information system model, 5–9 development, 312, 358, 367–374, 437, 442 development method, 371–374 development technique, 368 development tool, 368 evaluation, 364, 3690 failure, 354, 424–429, 442 infrastructure, 17, 25, 98–100, 114, 118, 120, 122, 125, 130, 171 management, 17, 19, 130 planning, 2, 123 portfolio, 458 strategy, 26, 27 Informative action, 184, 264, 406

Copyrighted material – 9781352007381

Infrastructure, 14–20, 98–130, 134–162, 171, 173, 177, 181, 187–190, 195, 200, 206–209, 216–224, 266, 273, 277, 280, 281, 282, 305, 315, 321, 332, 349, 355, 358–382, 385–413, 419–421, 430, 431, 433, 441, 442 Innovation, 26–30, 44, 69, 135, 140, 150, 173, 179, 193, 195, 201, 202, 216, 229, 260–282, 287, 291, 321–355, 360, 409, 411, 420–422, 429, 431, 441 Input, 7, 20, 28, 47, 84, 111, 117, 120, 146, 147, 160, 191, 193, 309, 328, 359, 368–370, 387, 395, 396, 400, 409, 437 Input device, 146, 160, 359, 409 Input subsystem, 459 Institutional perspective, 32–35, 55 Intent, 13, 59, 76, 78, 82, 83, 86, 92, 93, 230, 237, 240, 276, 306, 333, 343, 403, 407, 422, 432 Interaction failure, 459 Interest, 3, 4, 8, 13, 17, 32, 59, 72, 78, 81, 86, 90, 93, 109, 120, 140, 158, 188, 203, 211, 212, 220, 240, 267, 292, 331, 337, 342, 386, 395, 433 Interface layer, 18, 20, 148 Intermediary, 175, 180, 182, 210, 211, 223, 247, 348, 417 Intermediation, 182 Internal eGovernment, 249, 255, 256 Internet, 2, 3, 23, 24, 55, 134, 136–140, 142, 147–148, 150–153, 157, 161, 162, 206–208, 210, ­218–222, 234, 239, 264–266, 279, 281, 282, 363, 385, 386, 390, 391, 397, 416–422, 430, 432–434, 438 Internet auction, 222–223 Internet governance, 151, 432–433 Internet of things, 140, 385, 390, 397 Internet protocol, 136, 138, 152, 175, 432, 434 Internet service provider, 137, 222 Interoperability, 3, 29, 251, 339, 359 Interorganisational information system, 258 Intra-business eBusiness, 23, 25, 30, 168, 201, 228, 256 Intranet, 147–148, 150, 161, 162, 216 Intuition pump, 402, 405, 406 IP Address, 138, 139, 162, 237, 387 IS2010, xxiv

471


Copyrighted material – 9781352007381 Index ISP, 137, 138, 151, 161 Iterative development, 373, 426 ITIL, 376 Job analysis, 459 Job satisfaction, 306, 307, 352 Jobs, Steve, 320 Just-in-time (JIT), 127, 247 Kanban, 101–106, 314 Khipu, 64–66, 115, 406 Kilo-Byte, 66 Kipling, Rudyard, 301 Kula, 172 LAN. See Local Area Network Landauer, Ralph, 398 Le Guin, Ursula, 413 Legacy ICT system, 128 Lewin, Kurt, 329, 330, 401 Lewis, David, 44 Linear development, 372 Lists, 49, 70, 173, 192, 214, 223, 237, 268, 313, 412, 417, 418, 423 Local Area Network (LAN), 137, 425 Location-based services, 26, 271, 273, 275, 281 Location strategy, 43, 335–337, 364–366 London ambulance computer-aided dispatch system, 424–427 Luhn algorithm, 88 Lyon, David, 412 Lyons electronic office, 117, 145–147 Ma, Jack, 416 Machiavelli, Nicolo, 329 Machine learning, 395 Mackintosh, Charles Rennie, 289 Malinowski Bronislaw, 172 Maintenance. See Systems Maintenance Management, 2–5, 17–20, 25, 29, 43, 47–49, 51, 54, 55, 61, 111, 116–124, 126, 129, 130, 134, 145, 153, 155–159, 189, 209–212, 215–218, 220, 224, 230, 241, 247, 248, 251, 292, 293, 306–310, 313–317, 321, 322, 334–336, 339, 350, 352, 354, 361, 363–366, 370, 373, 375–380, 382, 387, 405, 406, 410, 426–429 Management information system, 17, 25, 115, 117–122, 124, 130, 156

472

Management-facing information system, 117, 130, 155 Managerial hierarchy, 205, 206, 243 MapReduce, 155 Market, 2, 27, 49, 71, 117, 183, 205, 206, 209, 214, 216, 222, 223, 243, 254, 264, 280, 281, 293, 326, 329, 337, 346, 391, 416, 417, 419, 420, 423, 430, 431, 434 Marketing and sales, 178, 418 Marketing analytics, 155, 228, 233, 235, 237, 255, 397 Marketing channel, 173, 231, 233, 255 Maslow, Abraham, 169 Maxwell’s demon, 402 McCarthy, John, 151 McGregor, Douglas, 306 Meals on wheels, 34–36, 38, 39, 41, 42, 44–47, 49, 79 Mega-byte, 66 Mega-package. See Enterprise Resource Planning System Metcalfe, Robert, 386 Metcalfe’s law, 186, 222 Method. See Information systems development method Microsoft, 49, 129, 359, 382, 420, 431, 433–434, 438 MIS. See Management Information System MMS, 263 Mobile Commerce, 25, 30, 156, 201, 239, 260–282 Mobile device, 26, 271, 274, 280 Model, 5, 6, 18, 26–28, 30, 38, 50, 51, 75, 81, 95, 115, 119, 136, 144, 153, 155, 210, 216, 218, 221–224, 288, 297, 302, 309, 317, 321–323, 328–330, 345, 346, 350–355, 361, 363, 366, 372, 373, 376, 378, 407, 417, 418 Modelling, 5, 31, 50, 54, 55, 286, 301–302, 308, 322 Modulation, 63 Moore, Gordon, 398 MoSCoW prioritisation, 294, 298 Motivation model, 330, 332, 335, 345 Movie industry, 173, 183, 341, 422 M-Pesa, 274 Nakomoto, Satoshi, 175 Napster, 421, 423 Narrowcasting, 266, 267

National health service, 32, 332, 424 Negative feedback, 48 Negentropy, 42, 277 Neural net, 395, 396 Non-repudiability, 157, 161, 162 Observation, 26, 286, 288, 296, 298, 299, 317 Ocado, 346, 434, 435 Offshoring, 129, 254 Omidyar Pierre, 222–223 Omni-channel retailing, 212–213 Online grocery, 23, 181, 207, 346, 404, 434–436 Ontology, 50, 51 Open source software, 206, 371, 378, 434, 436–439 Open system, 6, 27, 29, 31, 38, 39, 45, 167, 287, 322, 326, 408 Operating procurement, 243, 248 Operating system, 13, 154, 160, 271, 289, 378, 395, 419, 420, 426, 433, 437, 438, 450 Operational management, 17, 130 Operations, 2, 4, 25, 47, 49, 55, 61, 67, 99, 107–111, 114, 118, 146, 147, 152, 155, 167, 177, 178, 241, 243, 248, 254, 315, 321, 326, 328, 336, 362–365, 367, 375, 378, 382, 387, 390, 399, 423, 426, 435 Organisation, 2–10, 13, 14, 16–30, 31–55, 59–61, 66, 68, 71–73, 78–83, 93, 98–107, 114–130, 134–137, 147–150, 153–162, 166–170, 177–181, 183, 200, 201–207, 210–213, 215–222, 228–230, 247–250, 266–268, 271, 273, 277–280, 286–317, 321–323, 328–342, 346, 349–355, 358–364, 366–372, 374–376, 380–382, 400–402, 404–413 Organisation theory, 43 Outbound logistics, 9, 10, 15–18, 25, 122, 123, 130, 150, 178, 210, 211, 217, 218, 342, 403, 418 Output, 7, 20, 21, 44, 84, 120, 146, 147, 154, 169, 191, 193, 286, 288, 291, 312, 313, 317, 359, 368, 372, 390, 395, 400, 409, 429, 437 Output device, 146, 359, 409, 437 Output subsystem, 461

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Index Outsourcing, 129, 153, 154, 248, 280, 281, 359, 360, 364, 366, 367, 378, 382, 397, 428, 429 P2P eCommerce, 24, 215, 279, 418, 419, 436 PaaS, 153–154 Package development, 371 Packet switching, 139 Page, Larry, 237, 430 Paine, Thomas, 349 Parker, Sean, 421, 423 Participation, 26, 81, 173, 175, 193, 205, 206, 286, 288, 292, 296, 298, 299, 317, 369 Partner, 24, 280, 434 Partnership chain, 24, 166, 167, 180, 183, 203, 279 Passport agency, 428–429 Pattern, 8, 9, 14, 26, 27, 31–34, 38–43, 45–48, 51–56, 59, 65, 78, 82, 89, 93, 114, 118, 121, 154, 158, 170, 184, 200, 203–205, 215, 253, 287, 289–292, 295–306, 308–310, 324, 328–336, 339, 349, 359, 369, 400, 401, 406–408, 412, 418, 431, 434–436 Pattern comic, 54, 301 Payroll information system, 17, 117, 119–121, 130 Performance, 3, 9, 24, 43, 45–49, 51, 69, 83, 118, 119, 155, 156, 160, 168, 216, 243, 248, 256, 278, 279, 280, 291–293, 305, 336, 341, 345, 349, 351, 352, 363, 366, 370, 372, 374, 378, 391, 398, 418, 424, 427 Performance measurement, 46, 49 Personal computer, 2, 3, 136, 137, 139, 140, 162, 175, 213, 274, 381, 419, 420, 433 Personal identity management, 156, 158–159, 254, 342, 343, 344 Pervasive computing, 386–388, 391 Pervasive objects, 387–388 PESTLE, 331, 332 Phatic communication, 184, 185, 187, 264 Physical environment, 3, 32, 380–382 Physical symbol system, 392 Physical symbol system hypothesis, 392 Plotting table, 108, 109, 111 Podcast, 281 Political environment, 168, 332

Polity, 2, 20, 29, 162, 166–169, 189, 262, 386 Porter Michael, 22, 44, 177, 178, 212, 280, 337, 421 Post-mortem evaluation, 351, 353–354 Potlatch, 172 Pre-conditions for electronic service delivery, 249 Primary activity, 166, 178, 179, 248, 280 Primary key, 125 Prince 2, 286, 315–316, 329 Privacy. See Data privacy Problem setting, 26, 286, 290, 291–295, 317 Problem situation, 292 Problem solving, 26, 290, 317 Process re-engineering, 462 Procedural algorithm, 88 Procurement, 124, 228–229, 243, 248, 251 Producer, 182 Product-based planning, 310 Production, 9, 12, 15, 16, 21, 51, 102–104, 106, 115, 121, 127, 169, 173, 243, 245, 248, 295 Production cost, 173 Production-related procurement, 243, 245, 248 Productivity paradox, 278 Programme management, 315–316 Programming language, 144, 360 Project, 136, 286, 308–310, 312–314, 316–317, 353, 362, 364–365, 367, 441 control, 313, 317 escalation, 353 management, 286, 309, 317, 364–365, 441 organisation, 312, 317 planning, 309–310, 317 Prototyping, 373, 426 Provider of ICT, 359 Public key infrastructure, 161 Punched card, 70 Purchase-order processing information system, 17, 116–117, 119, 130 Purpose, 291 Quantum computing, 398 RACI matrix, 294 Radio Frequency Identification. See RFID tag RAF fighter command, 105

Copyrighted material – 9781352007381

Raymond, Eric, 436–437 Read, 19, 70, 128 Record, 425 Referent, 79 Refreezing, 329 Regulation, 47, 189 Regulator, 2, 292 Reintermediation, 182 Relationship, 17, 21, 23, 36, 38, 45, 47, 55, 60–61, 79, 81, 92, 93, 98–99, 101, 111, 118, 121–124, 126–127, 130, 153, 156, 168–169, 177, 184–187, 189, 210–211, 215–217, 219, 224, 233, 241–243, 260, 269, 280, 299, 301, 309, 332, 371, 401, 408, 413 Repeat Commerce, 200, 204, 216, 218, 224, 240–241 Representation, 32, 40, 47, 51, 54–55, 65, 69, 72, 92, 143, 147, 151, 159, 166, 170, 195, 288, 294, 299, 301, 340, 430, 433 Requirements analysis, 462 Requirements elicitation, 369 Requirements specification, 369 RFID tag, 387 Rich picture, 286, 294–295, 308, 344 Risk analysis, 369 Robotics, 386, 389–391, 411 Role analysis, 305–306 enlargement, 307 enrichment, 307 rotation, 307 definition, 463 Router, 139, 161 Rules subsystem, 143, 152, 162, 271 Russell Bertrand, 349 Ryle Gilbert, 406 SaaS, 153–154 Sales-order processing information system, 119 SAP, 126, 129 Schrodinger’s cat, 402 Schumpeter, Joseph, 277, 340 Scrum, 308, 314, 315 Search engine, 153, 228, 234, 237, 238, 239, 255, 382, 430, 431 Search engine optimisation, 228, 234, 237, 255, 431 Searle, John, 82 Sebeok, Thomas, 413 Secondary activity, 178, 243 Secure socket layer, 161

473


Copyrighted material – 9781352007381 Index Security. See Data Security Semiotics, 78, 80 Sensor, 119, 155, 281, 390, 403 Sensory apparatus, 393, 403 Server, 66, 140, 153, 154, 161, 215, 222, 237, 370, 418, 437 Service, 21–23, 34, 153, 215, 253, 263, 273, 281, 418, 420, 423, 463 Service-oriented architecture (SOA), 152, 359 SGML, 463 Sign, 51, 60, 78, 172, 413, 420, 441 Sign-system, 35, 62 Simon Herbert, 287, 288, 289, 319, 323, 392, 395 Single-loop feedback, 463 Six honest serving men, 301–302 SMART goal, 334 SMS, 263, 266, 438 Social capital, 25, 167, 184–187, 189, 195, 219, 220, 221, 224, 235, 262 Social environment, 168, 332 Social media, 25, 30, 66, 155, 156, 184, 186, 187, 189, 190, 201, 220, 221, 224, 234, 235, 260–282, 290, 416, 417, 421, 423, 438, 442, 443 Social network, 23, 25, 167, 168, 181, 184–187, 189, 218–220, 224, 235, 262–264, 267, 269, 282, 332, 423, 442 Social networking site, 2, 164, 219–221, 264 Social sorting, 412 Sociotechnical system, 55, 100, 129, 317, 323, 368, 370, 426 Soft system, 8, 37, 43, 55, 100 Software, 13, 49, 55, 89, 93, 140, 151–154, 160, 161, 178, 206, 215, 235, 237, 239, 266, 267, 271, 305, 315, 360, 362, 364, 366, 368, 371, 371, 378, 379, 380, 382, 390, 395–397, 418–422, 426, 427, 430, 433, 434, 436–439 Speech act, 82, 296, 297 Stakeholder, 28, 135, 162, 249, 250, 278, 280, 291–298, 310, 331, 342, 343, 353, 369, 373, 426, 432 Stakeholder mapping, 294 Stakeholder identification, 464 State, 14, 17, 19, 35, 38, 68, 82, 111, 119, 120, 184, 329, 335, 379, 399, 403, 405, 412 Station X, 83–86, 127, 146, 160, 161, 406

474

Stock control information system, 464 Stonier Tom, 400, 413 Storage, 66, 135, 142, 153, 154, 156, 160, 178, 293, 363, 378, 381, 419, 428 Storage device, 153, 359, 381, 398 Storage subsystem, 293 Storyboarding, 301, 302 Strategic decision-making, 119, 155, 364 Strategic evaluation, 29, 350–352 Strategic implementation, 464 Strategy, 26–30, 32, 43, 44, 48, 49, 55, 88, 105, 119, 128–129, 146, 160, 207, 215, 254, 317, 321–355, 363–366, 393, 417, 418, 423, 429–431, 434 Strong AI, 393–395 Strong link, 186, 187, 264, 282 Subculture, 464 Suboptimisation, 304–305 Subsystem, 18, 27, 38, 39, 48, 57, 116, 162, 229, 293, 323, 408 Summative evaluation, 29, 350, 353 Superposition, 398–399 Supplier, 2, 6, 7, 17, 22, 23, 34, 35, 78, 99, 111, 114, 116, 117, 118, 123–125, 127–130, 148, 156, 162, 179, 180, 203, 210, 216, 241, 243, 245, 247, 280, 292, 315, 333, 352, 366, 367, 371, 372, 419, 420, 428, 437 Supplier relationship management, 17, 123, 124, 130, 156, 216, 217 Supplier-facing information systems, 17, 118, 123–125, 130, 178, 216 Supply chain, 22, 24, 25, 30, 111, 123, 124, 126, 144, 166, 179–180, 183, 200, 203, 206, 207, 216–218, 229, 241, 243, 247, 251, 256, 387 Supply chain management, 123, 217 Swim-lane, 92 SWOT, 335 Symbol, 13, 23, 59, 61, 63–65, 67, 70, 75, 76, 78–81, 92, 127, 158, 291, 397, 405 System, 1–30, 31–55, 68, 90, 98–100, 105, 107–125, 143–145, 161, 167–173, 177, 180, 184, 189–193, 195, 206, 209–216, 234, 241, 243, 251, 261, 277, 278, 287, 291–293, 295, 301, 304–309, 317, 322–332, 337, 339, 359, 362, 364–375, 392, 395, 401–411, 417–420, 424–429, 432–434, 437, 442

Systemics, 32, 36–37, 43, 50. See also General Systems Theory Systems Thinking. See Systemics Table, 18, 66, 108, 111, 124, 125, 145, 170, 289, 298, 418 Tactical management, 464 Tactics, 265, 336, 434 Tangible computing, 386, 388–389 Tangible information systems, 405, 409–411 Target advertisement, 238 Task analysis, 464 Taylor, Frederick Winslow, 45, 155 TCP/IP, 137, 162, 175 Technique, 5, 55, 84, 153, 155, 211, 212, 233, 235, 294, 296, 298, 299, 301, 302, 309, 331, 341, 350, 352, 353, 368 Telephony, 213, 266 Tera-Byte, 67, 154, 155 Tesco, 23, 32, 338, 346, 435, 436 Theory X, 306 Theory Y, 306 Thought experiment, 136, 174, 402–405 Three-tier architecture, 465 Timebox, 310, 314 Tool, 43, 150, 155, 219–221, 262, 264, 267, 280, 282, 339, 368, 395, 437 To-be model, 27, 323, 330, 346, 354 TPS. See Transaction Processing System Transaction, 2, 19, 20, 28, 29, 61, 72, 116, 118, 143, 144, 146, 147, 155, 157, 160–162, 175, 177, 195, 198, 205, 206, 211, 212, 218, 220–222, 233, 242, 278, 416, 417 Transactional data, 156, 162, 237 Transaction cost. See Coordination cost Transaction processing system, 118, 222 Transaction subsystem, 143, 152, 162, 271 Trolling, 260, 267, 423 Trump, Donald, 269, 423 Trust, 47, 49, 61, 150, 185, 221, 223, 425, 426 Turing, Alan, 127, 391 Turing machine, 127–128, 146, 398, 412 Turing test, 392 Tweet, 190, 220, 438

Copyrighted material – 9781352007381


Copyrighted material – 9781352007381 Index Twitter, 262, 265, 266, 417, 438 Tzu, Sun, 336 Uber, 274–278, 281 Ubiquitous computing, 30, 385, 386–391, 409 UK national identity card, 342–343 Unfreezing, 321, 329–330 Universal resource locator, 162 Update, 19, 20, 28, 29, 70, 73, 107, 144, 162, 253, 297, 338, 379, 387 Update function, 19, 20, 29, 162 URL. See Universal resource locator Usability, 148, 149, 370 USC, 71–73, 90–91, 144, 277 Use, 148, 149, 188, 385, 424 Use case, 465 Use failure, 465 User interface, 20, 143, 144, 152 Utility, 148–149, 151, 153, 419, 422 Value, 6, 21, 27, 29, 38, 44, 45, 111, 128, 167, 168–177, 205, 215, 219, 222, 237, 247, 249, 264, 278, 323, 351, 352, 408, 418, 423, 430

Value Added Network (VAN), 137 Value-chain, 166, 207, 280 Value-creating system, 7–8, 27, 44, 179, 183, 331, 418 Value-network, 280 Value-stream, 301 Variety, 38, 39, 51, 63, 66, 147, 307, 367, 422, 433 Vertical infrastructure, 16, 98, 100, 103, 105, 106 Viable system, 380 Vickers, Geoffrey, 292 Viral marketing, 233, 235, 255, 262, 267, 268, 423, 438 Virtual community, 219, 220, 221, 265 Virtual organisation, 466 Visualisation, 8, 9, 12, 15, 54, 55, 73, 75, 92, 154, 191, 286, 288, 289, 290, 294, 299, 308 Von Neumann, John, 146

Weak link, 25, 186, 187, 189, 262, 264, 267, 282 Web. See WWW Web 2.0, 150–151, 220, 262, 439 Web analytics, 155, 235, 237, 239 Web page, 140, 150, 209, 237, 262, 263, 430 Web unicorn, 278, 281 Web-site, 236, 416 Wheeler, John Archibald, 412 Wicked problems, 288, 291 Wide Area Network (WAN), 137 WiFi, 466 Wiki, 439 Wikipedia, 281, 437, 439–443 WiMax, 466 Word, 32, 41, 51, 78, 386, 438 Worldview, 278, 279, 291–295, 302, 306, 408 WWW, 466

Waggle dance, 76, 78 Wales, Jimmy, 439 Warning network, 105, 108–111, 114, 128 Weak AI, 395, 397, 411

XML, 242

Copyrighted material – 9781352007381

Zipf, 62 Zuboff, Shoshanna, 279 Zuckerberg, Mark, 267, 422

475


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.